Across
- 3. A computer screen that doesn’t need a mouse
- 5. A virtual meeting service
- 6. A not-so-yummy way for websites to remember users
- 8. A person who uses digital tools to test or break into secure systems
- 10. A type of legal control imposed on companies
- 11. The _____ system controls the basic functions of your computer
- 13. Software that includes advertising
- 16. Canned meat, or unwanted email
- 18. A person who uses their computer skills to break the law
- 19. Malicious software that extorts money
- 24. A.I.
- 25. A company’s rules about handling private user data
- 27. A switching device that dispatches data to multiple destinations
- 29. A security system that uses aspects of your physical body to identify you as an authorized user
- 30. A website dedicated to user-created videos
Down
- 1. A secret access code
- 2. The act of breaking into a secure system is called a ______
- 4. A method of impersonating a device or user for nefarious purposes
- 7. A pocket-sized phone with extended functionality
- 9. A method of keeping information secret
- 12. Technology and practices that keep your digital information secret
- 14. Cybernetically enhanced human, or digital device brand
- 15. A very shiny kind of metal
- 17. A trip among the animals
- 20. Net _____, a service provider’s guarantee they will not censor internet content
- 21. A method of tricking people into giving away secure information
- 22. The “name” of a website
- 23. A mathematical formula used by computers to automate complex tasks
- 26. A method of breaching a secure system by hiding malicious code inside a file
- 28. A new term for the Internet