Across
- 3. Special HW that you need to videoconference.
- 6. It protects a company intranet from outside attacks.
- 8. User have to enter it to gain access to a network.
- 11. As soon as possible.
- 12. The line that describes the content of an emai.
- 14. A person who uses technology for criminal aims.
Down
- 1. Small files placed on your hard drive by web servers so that they can recognize your PC when you return to their site.
- 2. It is a person who uses their PC skill to enter computers and networks illegally.
- 4. It is program designed to infiltrate or damage your computer.
- 5. Technology that enables people to make phone calls over the internet.
- 7. In my honest opinion.
- 9. Characters used when interacting with people online.
- 10. The name given to junk email.
- 12. A protocol which provides secure trasactions.
- 13. Bye for now.
