LIVING ONLINE

12345678910111213141516171819202122232425262728293031323334
Across
  1. 1. Used by machines like an ATM to conduct secure transactions.
  2. 4. Saved URL
  3. 6. Sending an existing e-mail message on to a new recipient
  4. 7. Default Web page that opens when a browser is launched.
  5. 9. Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
  6. 10. Copying something created by someone else not giving credit
  7. 16. Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
  8. 19. Businesses that have a physical location.
  9. 22. Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
  10. 23. Wireless technology used to network computers together and to other devices like printers or servers.
  11. 24. Bad hacker who creates malicious programs to break into computers and do harm
  12. 25. Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
  13. 26. E-mail attack or scam designed to gather information from a user while appearing to be safe
  14. 27. Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
  15. 30. Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
  16. 31. Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
  17. 33. Any machine attached to a network: client, server, printer, and so on.
  18. 34. Boolean search operator that requires both search terms to be included in the search results
Down
  1. 1. Standards used to control how data is sent over a network
  2. 2. Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
  3. 3. Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
  4. 4. Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
  5. 5. Unsolicited e-mail message sent by someone you don’t know.
  6. 8. Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
  7. 11. A program or feature used to block spam or e-mail messages from specific senders
  8. 12. Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
  9. 13. Most popular search engine.
  10. 14. Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
  11. 15. Microsoft’s dedicated e-mail soft¬ware program.
  12. 17. Boolean operator that excludes specific words from search results.
  13. 18. Any field in a form on a Web page or other document where the user can enter text.
  14. 20. Part of an IP address that defines the network from which a user is then accessing the Internet.
  15. 21. Buying and selling products and ser¬vices by bidding over the Internet
  16. 28. Disposing of paper and other products so they can be processed for reuse
  17. 29. Unique name given to each network and used to identify specific e-mail and Web servers.
  18. 32. A delivered e-mail message has been ___________.