Across
- 7. A system in which users write to as well as read files or in which users are allotted some amount of space for personal files on a common server, giving access to other users as they see fit. The latter kind of file sharing is common in schools. Friend Someone on your list of contacts associated with a social networking site
- 8. Short message (or messaging) service, a system that enables mobile phone users to send and receive text messages
- 9. Software Application designed to protect PCs from malicious computer code (virus)
- 12. benefiting, usually deliberately but not necessarily illegally from others' information or effort but does not offer anything in return.
- 14. A small piece of data sent from a website and stored in a user's web browser while a user is browsing a website.
- 18. New versions of programs that fix problems that have been found. Often sent out automatically, it is important that security updates are installed as soon as they are released as hackers and malware often try to make use of the errors that have been fixed.
- 20. Short for Instant Messaging, IM is the exchange of typed messages between computer users in real time via the Internet.
- 21. Acceptable Use Policy - set of rules applied to a network, website or computer system that restricts the ways the network site or system may be used. Every school should have one!
- 25. Child Exploitation and Online Protection dedicated to eradicating the sexual abuse of children. Part of UK policing tracking and bringing offenders to account. www.ceop.gov.uk Encryption The science of scrambling data be it text, audio, or video so that it can only be read by the authorised sender and recipient.
- 26. Software Programs that can be installed on computers to limit what children – or anyone else – can do. Often used to restrict access to lists of inappropriate websites, block chatrooms and other potentially dangerous programs and even keep a record of all email and other messages sent and received. No parental control software is completely reliable and it should only be used as part of a broader approach to online safety which involves talking to children and sharing online activities with them.
- 27. Multimedia Messaging Service, a system that enables mobile phones to send and receive pictures and sound clips as well as text messages.
- 28. Content Material which is illegal under national legislation. The most common types of such content are images of sexual abuse of children, extreme sexual violence, hate and xenophobia websites.
- 31. Malicious software that is designed to infiltrate or damage a computer system without the owner’s informed consent. It includes computer viruses, worms,
Down
- 1. Bullying When the Internet, mobile phones or other devices are used to send or post text or images intended to hurt or embarrass or harm another person.
- 2. Theft The practice of stealing personal details (e.g. name, birth date, credit card number) and using them illegally.
- 3. A word or series of letters, numbers and punctuation that only you know, which you use to log on to computers, networks or online services.
- 4. A system that prevents unauthorised access to a computer over a network, such as the internet. Firewalls can be either hardware or software businesses tend to use the former; home users the latter.
- 5. Software or hardware product designed to prevent access to inappropriate websites on the internet. It does this by denying or allowing access based on lists of pre-classified addresses, or by examining the web data for keywords or unwanted content. We recommend E2BN’s Protex www.protex.e2bn.org
- 6. The process of collecting information from a computer by hidden means - often makes use of computer programs called spyware
- 10. A term referring to good behaviour while connected to the Internet. Netiquette mainly refers to behaviour while using Internet facilities such as individual Web sites, emails, newsgroups, message boards, chat rooms or Web communities. Teach your pupils ‘netiquette’!
- 11. A video camera designed to connect to your PC. It can be used to record video clips and still images which you can send by email, uploaded or transmitted directly over the internet for video-conferencing.
- 13. Peer-to-peer; denoting a network or data communications in which no dedicated server is involved.
- 15. Is the communications regulator. They regulate the TV and radio sectors, fixed line telecoms and mobiles, plus the airwaves over which wireless devices operate. www.ofcom.org.uk
- 16. Mail Unwanted email messages that are sent out to people via their email address.
- 17. Computer program that puts into action anti-spam/spim/spit techniques
- 19. Network A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others. Most social network services are web based and provide a variety of ways for users to interact, such as e-mail and instant messaging services.. Examples include Bebo, Facebook, and Myspace.
- 22. file or collection of files that fixes problems with existing applications by making changes to the program
- 23. horses, spyware, dishonest adware and other malicious and unwanted software.
- 24. Slang term used to describe illegal access of computer systems by unauthorised users.
- 25. Computing Storing and accessing data and programs over the Internet instead of from your computer's hard drive.
- 29. Tweets are text-based posts on the social networking site Twitter. They are displayed on the author's profile page and delivered to the author's subscribers known as followers. Can be restricted to a circle of friends or, by default, allow open access.
- 30. Slapping Taking and publishing pictures of assault online.