Across
- 3. scam that involves a fraudulent e-mail
- 9. hardware and code
- 12. Security-any software or technique used to prevent online crime
- 14. The Communications Decency Act
- 15. unsolicited adds on your computer
Down
- 1. predator- An adult internet user who exploits children or teens
- 2. unsolicited email or junk mail
- 4. rules/manners of inline usage
- 5. person who access internet files either legally or illegally
- 6. Controls-software that allows parents to control what their children do online
- 7. hostile, strongly worded message that may contain obscene language
- 8. Media-online site where people can post information about themselves
- 10. virtual sexual encounters
- 11. a sexual message sent to someone
- 13. Rooms-an interactive forum where you can talk in real time