Matthew Prince

123456789101112
Across
  1. 2. A person who unknowingly gains access to someone's computer files.
  2. 4. Malicious software that is disguised as something good or useful. It technically isn't a virus.
  3. 6. specific software that you can try before purchase.
  4. 9. technology that prevents a user from gaining access to an inappropriate website, and
  5. 11. The "electronic" world perceived on a computer screen, this term if usedin opposition to the "real" world.
  6. 12. a software program, designed specifically to damage the files of a computer that recieves it.
Down
  1. 1. networks from an unauthorized user.
  2. 3. Applications designed to search for a virus and repair computer files.
  3. 5. any unwanted e-mail ( often of a commercial nature sent out in bulk )
  4. 7. formerly known as Web Log. A blog is a website that contains dated text entries. A blog can serve many purposes from newsletters to personal diaries to topical discussions.
  5. 8. a bully who goes online through cyber space to bully others online.
  6. 10. software that is used to view varieties of internet resources on the World Wide Web ( WWW ).
  7. 11. a small text file that identifies users' personal preferences and that allows a web site's server to extract your information from the database.