TECHNOLOGY

123456789101112131415
Across
  1. 2. A PLUG_AND_PLAY INTERFACE THAT ALLLOWS A COMPUTER TO COMMUNICATEWITH PERIPHERAL AND OTHE DEVICES.
  2. 4. WHAT IS A NETWORK SECURITY SYSTEM USED TO STOP UNAUTHORISED ACCESS
  3. 7. PROGRAM THAT CAN BE DOWNLOADED WHICH ALLOWS USERS TO ENHANCE THEIR BROWSER;THIS ALLOWS EXTRA ACTIVITIES OF THE WEB
  4. 11. DATA SENT TO YOUR COMPUTER BY A WEB SERVER THAT RECORDS YOUR ACTIONS ON A CERTAIN WEB SITE
  5. 12. WEB ADDRESS
  6. 13. AN EMAIL, POSTING PHOTOS ON SOCIAL MEDIA SITE USING YOUR WEBCAM
  7. 14. PROCESS OF CONVERTING DATA INTO A SECRET CODE FOR TRANSMISSION OVER A PUBLIC NETWORK
  8. 15. ACT OF TRYING TO ACCESS SOMEONES INFORMATION ILLGEGALLY
Down
  1. 1. CONSISTS OF EIGHT BITSWHAT IS CALLED IF PEOPLE ARE NASTY TO YOU ONLINE
  2. 3. A PERSON WHO POST INFLAMMATORY COMMENTS OR MESSAGES IN AN ONLINE COMMUNITY SUCH AS A FORUM, CHATROOM, BLOG OR ON SOCIAL NETWORKING SITES
  3. 5. A CLIENT SOFTWARE PROGRAM THAT RUNS AGAINST A WEB SERVER OR THE OTHER INTERNET SERVER AND ENABLES A USER TO NAVIGATE THE WOLRD WIDE WEB (WWW) TO ACCESS AND DISPLAY DATA
  4. 6. AT WHICH A PROCESSOR CAN COMPLETE A PROCESSING CYCLE
  5. 8. COPY (DATA) RROM ONE COMPUTER SYSTEM TO ANOTHER, TYPICALLY OVER THE INTERNET
  6. 9. SYNCHRONUS, TEXT-BASED COMMUNICATION VIA COMPUTER
  7. 10. TYPE OF TEXT STYLE AND SIZE
  8. 14. MADE UP OF NUMBERS SEPARATED BY THREE DOTS THAT IDENTIFIES A PARTICULAR COMPUTER ON THE IN TERNET