Living Online

1234567891011121314151617181920212223242526272829303132
Across
  1. 1. Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
  2. 5. Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
  3. 7. Wireless technology used to network computers together and to other devices like printers or servers.
  4. 8. Any machine attached to a network: client, server, printer, and so on.
  5. 10. Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
  6. 11. Copying something created by someone else not giving credit
  7. 12. Bad hacker who creates malicious programs to break into computers and do harm
  8. 13. Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
  9. 15. Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
  10. 16. A program or feature used to block spam or e-mail messages from specific senders
  11. 18. Standards used to control how data is sent over a network
  12. 20. Businesses that have a physical location.
  13. 21. Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
  14. 23. Boolean operator that excludes specific words from search results.
  15. 24. Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
  16. 27. Unique name given to each network and used to identify specific e-mail and Web servers.
  17. 29. A delivered e-mail message has been ___________.
  18. 30. Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
  19. 31. E-mail attack or scam designed to gather information from a user while appearing to be safe
Down
  1. 2. Disposing of paper and other products so they can be processed for reuse
  2. 3. Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
  3. 4. Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
  4. 5. Saved URL
  5. 6. Part of an IP address that defines the network from which a user is then accessing the Internet.
  6. 9. Buying and selling products and ser¬vices by bidding over the Internet
  7. 14. Boolean search operator that requires both search terms to be included in the search results
  8. 16. Sending an existing e-mail message on to a new recipient
  9. 17. Any field in a form on a Web page or other document where the user can enter text.
  10. 19. Microsoft’s dedicated e-mail soft¬ware program.
  11. 22. Most popular search engine.
  12. 23. Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
  13. 24. Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
  14. 25. Used by machines like an ATM to conduct secure transactions.
  15. 26. Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
  16. 28. Default Web page that opens when a browser is launched.
  17. 32. Unsolicited e-mail message sent by someone you don’t know.