Across
- 2. A PLUG_AND_PLAY INTERFACE THAT ALLLOWS A COMPUTER TO COMMUNICATEWITH PERIPHERAL AND OTHE DEVICES.
- 4. WHAT IS A NETWORK SECURITY SYSTEM USED TO STOP UNAUTHORISED ACCESS
- 7. PROGRAM THAT CAN BE DOWNLOADED WHICH ALLOWS USERS TO ENHANCE THEIR BROWSER;THIS ALLOWS EXTRA ACTIVITIES OF THE WEB
- 11. DATA SENT TO YOUR COMPUTER BY A WEB SERVER THAT RECORDS YOUR ACTIONS ON A CERTAIN WEB SITE
- 12. WEB ADDRESS
- 13. AN EMAIL, POSTING PHOTOS ON SOCIAL MEDIA SITE USING YOUR WEBCAM
- 14. PROCESS OF CONVERTING DATA INTO A SECRET CODE FOR TRANSMISSION OVER A PUBLIC NETWORK
- 15. ACT OF TRYING TO ACCESS SOMEONES INFORMATION ILLGEGALLY
Down
- 1. CONSISTS OF EIGHT BITSWHAT IS CALLED IF PEOPLE ARE NASTY TO YOU ONLINE
- 3. A PERSON WHO POST INFLAMMATORY COMMENTS OR MESSAGES IN AN ONLINE COMMUNITY SUCH AS A FORUM, CHATROOM, BLOG OR ON SOCIAL NETWORKING SITES
- 5. A CLIENT SOFTWARE PROGRAM THAT RUNS AGAINST A WEB SERVER OR THE OTHER INTERNET SERVER AND ENABLES A USER TO NAVIGATE THE WOLRD WIDE WEB (WWW) TO ACCESS AND DISPLAY DATA
- 6. AT WHICH A PROCESSOR CAN COMPLETE A PROCESSING CYCLE
- 8. COPY (DATA) RROM ONE COMPUTER SYSTEM TO ANOTHER, TYPICALLY OVER THE INTERNET
- 9. SYNCHRONUS, TEXT-BASED COMMUNICATION VIA COMPUTER
- 10. TYPE OF TEXT STYLE AND SIZE
- 14. MADE UP OF NUMBERS SEPARATED BY THREE DOTS THAT IDENTIFIES A PARTICULAR COMPUTER ON THE IN TERNET