Across
- 6. AN EMAIL, POSTING PHOTOS ON SOCIAL MEDIA SITE USING YOUR WEBCAM
- 7. SOFTWARE SYSTEM THAT LINKS TOPICS ON THE SCREEN TO RELATED INFORMATION AND GRAPHICS, WHICH ARE TYPICALLY ACCESSED BY A POINT-AND-CLICK METHOD
- 8. WHAT IS A NETWORK SECURITY SYSTEM USED TO STOP UNAUTHORISED ACCESS
- 10. A PLUG_AND_PLAY INTERFACE THAT ALLLOWS A COMPUTER TO COMMUNICATEWITH PERIPHERAL AND OTHE DEVICES.
- 11. A CLIENT SOFTWARE PROGRAM THAT RUNS AGAINST A WEB SERVER OR THE OTHER INTERNET SERVER AND ENABLES A USER TO NAVIGATE THE WOLRD WIDE WEB (WWW) TO ACCESS AND DISPLAY DATA
- 12. DEVICE THAT FEEDS DATA INTO A COMPUTER, SUCH AS KEYBOARD OR MOUSE
- 13. CONSISTS OF EIGHT BITSWHAT IS CALLED IF PEOPLE ARE NASTY TO YOU ONLINE
- 17. WEB ADDRESS
- 18. A PERSON WHO POST INFLAMMATORY COMMENTS OR MESSAGES IN AN ONLINE COMMUNITY SUCH AS A FORUM, CHATROOM, BLOG OR ON SOCIAL NETWORKING SITES
- 19. ACT OF TRYING TO ACCESS SOMEONES INFORMATION ILLGEGALLY
Down
- 1. MADE UP OF NUMBERS SEPARATED BY THREE DOTS THAT IDENTIFIES A PARTICULAR COMPUTER ON THE IN TERNET
- 2. TYPE OF TEXT STYLE AND SIZE
- 3. DATA SENT TO YOUR COMPUTER BY A WEB SERVER THAT RECORDS YOUR ACTIONS ON A CERTAIN WEB SITE
- 4. SYNCHRONUS, TEXT-BASED COMMUNICATION VIA COMPUTER
- 5. PROCESS OF CONVERTING DATA INTO A SECRET CODE FOR TRANSMISSION OVER A PUBLIC NETWORK
- 9. COPY (DATA) RROM ONE COMPUTER SYSTEM TO ANOTHER, TYPICALLY OVER THE INTERNET
- 14. PROGRAM THAT CAN BE DOWNLOADED WHICH ALLOWS USERS TO ENHANCE THEIR BROWSER;THIS ALLOWS EXTRA ACTIVITIES OF THE WEB
- 15. COMPUTER PROGRAM SENT TO GATHER INFORMATION FROM YOUR COMPUTER
- 16. AT WHICH A PROCESSOR CAN COMPLETE A PROCESSING CYCLE