Across
- 2. the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more
- 4. wireless networking technology that uses radio waves to provide wireless high-speed Internet access
- 6. irrelevant or inappropriate messages sent on the internet to a large number of recipients
- 8. computer programing system
- 9. use and or distribution of copyrighted computer software in violation of the copyright laws or applicable license restrictions
- 14. random-access memory
- 15. somebody who gets into your computer and gets your personal information
- 16. good hacker
- 18. network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- 19. a person who looks for other people in order to use, control, or harm them in some way
- 21. interconnected computing devices that can exchange data and share resources with each other
- 23. when somebody gets all your personal information and starts acting like you
- 24. program that can copy itself and infect a computer without permission or knowledge of the user
- 25. facts and statistics collected together for reference or analysis
Down
- 1. the practice of taking someone else's work or ideas and passing them off as one's own.
- 3. microcomputer and software
- 5. bad hacker
- 7. being mean to somebody on the internet
- 10. protects your computer
- 11. secret codes for personal information log in
- 12. inappropriate communication between people
- 13. the programs and other operating information used by a computer.
- 17. a gateway that passes data between one or more local area networks (LANs)
- 20. keeps people from using there stuff or they will get in trouble
- 22. computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols