Across
- 3. someone who sends ,posts , or shares negative things about another person
- 4. use and or distribution of copyrighted computer software in violation of the copyright laws or applicable license restrictions
- 5. the programs and other operating info used by a computer
- 8. Hats good hackers
- 12. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- 13. a secret word or randomized characters used t get into something
- 15. computer programing system
- 19. the machines, wiring, and other physical components of a computer or other electronic system
- 20. a piece of code that is capable of copying itself and corrupting the system or destroying data
- 21. the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
- 22. a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- 23. is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list and is sent for commercial purposes
Down
- 1. microcomputer and software
- 2. a device that forwards data packets to the appropriate parts of a computer network
- 4. internet users who exploit children and teens for sexual and violent purposes
- 6. a wireless networking technology that uses radio waves to provide wireless high-speed Internet access
- 7. interconnected computing devices that can exchange data and share resources with each other
- 9. designed to detect and destroy computer
- 10. information that has been translated into a form that is efficient for movement or processing
- 11. computer expert that can get personal info
- 12. Theft the fraudulent acquisition and use of a person's private identifying information, usually for financial gain
- 14. an action or practice of sending sexually explicit photographs and/or messages
- 16. the practice of taking someone else's work or ideas and passing them off as one's own
- 17. Hats bad hackers
- 18. random-access memory