Across
- 1. The name a user selects to be identified on a computer, on a network, or in an online gaming forum.
- 4. Crime in which someone obtains the vital information(ie credit card, social security number, bank account info) of someone, usually to steal money.
- 5. To upload information to the Web.
- 8. Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
- 10. A program that lets you find, see, and hear material on web pages.
- 13. A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer.
- 15. specific features or software that allow parents to manage the online activities of children.
- 20. To send information from your computer to another computer.
- 21. A scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
- 22. A secret word or number that must be used to gain access to an online service or to modify software, such as a parental control.
Down
- 2. Software products that allow parents to monitor or track the websites or e-mail messages that a child visits or reads.
- 3. A tracking feature of Internet browsers that shows all the recent websites visited.
- 6. Allows you to block certain types of content from being displayed.
- 7. A form of malicious code that displays unsolicited advertising on your computer.
- 9. An electronic mail message sent from one computer or mobile device to another computer or mobile device.
- 11. A program, or set of instructions, that runs on a computer.
- 12. malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—designed to damage the computer or collect information.
- 14. To copy a file from one computer system to another via the internet (usually your computer or mobile device).
- 16. Software that attempts to block malicious programs/code/software (called viruses or malware) from harming your computer.
- 17. A piece of information about your visit to a website that some websites record automatically on your computer.
- 18. A wide variety of software installed on people’s computers, collects info about you without your knowledge and sends it to whoever wrote the program.
- 19. A self-replicating program that typically arrives through e-mail or downloads and multiplies on the hard drive, quickly exhausting the computer’s memory.
- 23. Any unsolicited e-mail, or junk mail. Internet service Providers, e-mail software, and other software can help block some, but not all, spam.