Across
- 3. Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
- 5. Copying something created by someone else not giving credit
- 7. Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
- 9. Wireless technology used to network computers together and to other devices like printers or servers.
- 10. Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
- 13. Any field in a form on a Web page or other document where the user can enter text.
- 14. Saved URL
- 15. Unique name given to each network and used to identify specific e-mail and Web servers.
- 17. Buying and selling products and ser¬vices by bidding over the Internet
- 19. Sending an existing e-mail message on to a new recipient
- 22. Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
- 23. Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
- 24. Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
- 25. Standards used to control how data is sent over a network
- 29. Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
- 30. Boolean search operator that requires both search terms to be included in the search results
- 31. Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
- 33. E-mail attack or scam designed to gather information from a user while appearing to be safe
- 36. Disposing of paper and other products so they can be processed for reuse
Down
- 1. Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
- 2. Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
- 4. Businesses that have a physical location.
- 6. Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
- 8. A program or feature used to block spam or e-mail messages from specific senders
- 11. Any machine attached to a network: client, server, printer, and so on.
- 12. Most popular search engine.
- 16. Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
- 18. Part of an IP address that defines the network from which a user is then accessing the Internet.
- 20. Bad hacker who creates malicious programs to break into computers and do harm
- 21. Microsoft’s dedicated e-mail soft¬ware program.
- 26. Default Web page that opens when a browser is launched.
- 27. Used by machines like an ATM to conduct secure transactions.
- 28. Unsolicited e-mail message sent by someone you don’t know.
- 32. Boolean operator that excludes specific words from search results.
- 34. Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
- 35. A delivered e-mail message has been ___________.
