Across
- 3. replacement of a single course of stonework by two or more lower courses.
- 6. a piece of writing or other work reflecting such unauthorized use or imitation.
- 8. a secret word or expression used by authorized persons to prove their right to access, information, etc.
- 11. Wide Area Network
- 12. Drive a very small, portable, solid-state hard drive that can be inserted to a USB port for storage and retrieval of data.
- 13. an external serial bus interface standard for connecting peripheral devices to a computer, as in USB port or USB cable.
- 15. Local Area Network
- 17. an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.
- 18. a website containing a writer's or group of writers' own experiences, observations, opinions, etc., and often having images and links to other websites.
- 19. a website that allows users to add, delete, or revise content by using a web browser.
Down
- 1. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
- 2. to grant authoritative permission or license to.
- 4. the use of software components for software development.
- 5. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
- 6. a device or unit that operates separately from the CPU but is connected to it, as a mouse, printer, speakers, etc.
- 7. Acceptable Use Policy
- 9. disruptive online messages, especially commercial messages posted on a computer network or sent as email.
- 10. the rules of etiquette that apply when communicating over computer networks, especially the internet.
- 14. use reasonable and limited use of copyrighted material so as not to infringe upon copyright.
- 16. Security protects your network and data from breaches, intrusions and other threats.