Across
- 4. Deceiving someone into making themselves vulnerable online
- 6. Software that allows the user to search specific information online
- 7. Storage accessible through various devices
- 9. Software that acts as a foundation to the device
- 12. Personal files saved to keep browsing information on websites
- 15. electronic device that manipulates information
- 19. secondary device connected to computers, typically used to control it (i.e mouse or keyboard)
- 21. The understanding of using online tools
Down
- 1. Tactic where someone takes on the identity of someone for personal gain
- 2. A laptop ran off of google
- 3. A certain date or time associated with digital records or files
- 5. The address to a webpage
- 8. Computer that can fit on or under a typical desk
- 10. A screen that displays information generated by a computer
- 11. A port to connect hardware
- 13. The physical components to a computer
- 14. Virtual instructions, data, or programs used to complete tasks
- 16. A built-in security system that filters online traffic
- 17. A portable computer with a keyboard and a screen
- 18. Additional security process to ensure privacy
- 20. temporary memory used for active programs