LIVING ONLINE

123456789101112131415161718192021222324252627282930313233343536
Across
  1. 3. Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
  2. 5. Copying something created by someone else not giving credit
  3. 7. Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
  4. 9. Wireless technology used to network computers together and to other devices like printers or servers.
  5. 10. Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
  6. 13. Any field in a form on a Web page or other document where the user can enter text.
  7. 14. Saved URL
  8. 15. Unique name given to each network and used to identify specific e-mail and Web servers.
  9. 17. Buying and selling products and ser¬vices by bidding over the Internet
  10. 19. Sending an existing e-mail message on to a new recipient
  11. 22. Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
  12. 23. Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
  13. 24. Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
  14. 25. Standards used to control how data is sent over a network
  15. 29. Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
  16. 30. Boolean search operator that requires both search terms to be included in the search results
  17. 31. Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
  18. 33. E-mail attack or scam designed to gather information from a user while appearing to be safe
  19. 36. Disposing of paper and other products so they can be processed for reuse
Down
  1. 1. Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
  2. 2. Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
  3. 4. Businesses that have a physical location.
  4. 6. Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
  5. 8. A program or feature used to block spam or e-mail messages from specific senders
  6. 11. Any machine attached to a network: client, server, printer, and so on.
  7. 12. Most popular search engine.
  8. 16. Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
  9. 18. Part of an IP address that defines the network from which a user is then accessing the Internet.
  10. 20. Bad hacker who creates malicious programs to break into computers and do harm
  11. 21. Microsoft’s dedicated e-mail soft¬ware program.
  12. 26. Default Web page that opens when a browser is launched.
  13. 27. Used by machines like an ATM to conduct secure transactions.
  14. 28. Unsolicited e-mail message sent by someone you don’t know.
  15. 32. Boolean operator that excludes specific words from search results.
  16. 34. Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
  17. 35. A delivered e-mail message has been ___________.