Across
- 3. tricks the user into posing that is a security software
- 4. unwanted email most from bots
- 9. runs in the background and monitors what you are doing
- 11. the information superhighway
- 12. a provision that allows you to use copyrighted work without consent with certain limitations
- 13. an option to hide a post so that search engines could not scan it
- 14. a malicious software
- 15. a browser feature that Is synonymous to “private” browsing
Down
- 1. states that anyone who uses you work without your consent in punishable by law
- 2. used to record the keystrokes done by the user
- 5. sends on official-looking email and is designed to steal sensitive personal information
- 6. designed to send you advertisement
- 7. disguised as a useful program but is not
- 8. It means respecting other users’ views and displaying common courtesy when posting your views to online discussion groups
- 10. replicates and can transfer from one computer to another
- 13. more complicated way of phishing where it exploits
