words

1234567891011121314151617181920
Across
  1. 2. a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer, computer system, or electronic device.
  2. 3. replacement of a single course of stonework by two or more lower courses.Blog - a website containing a writer's or group of writers' own experiences, observations, opinions, etc., and often having images and links to other websites.
  3. 4. wide area network
  4. 7. disruptive online messages, especially commercial messages posted on a computer network or sent as email (often used attributively) (of promotional content on the internet) irrelevant or misdirected
  5. 9. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.: works granted such right by law on or after January 1, 1978, are protected for the lifetime of an author or creator and for a period of 70 years after their death.
  6. 11. a website that allows users to add, delete, or revise content by using a web browser
  7. 13. an act or instance of using or closely imitating the language and thoughts of another author without authorization and the representation of that author's work as one's own, as by not crediting the original author
  8. 14. reasonable and limited use of copyrighted material so as not to infringe upon copyright:
  9. 16. universal serial bus: an external serial bus interface standard for connecting peripheral devices to a computer, as in a USB port or USB cable.
  10. 19. local area network
  11. 20. the rules of etiquette that apply when communicating over computer networks, especially the internet.
Down
  1. 1. being or serving as an element (in something larger); composing; constituent:
  2. 5. the protection of the underlying networking infrastructure from unauthorized access, misuse, or theft.Password - a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer, computer system, or electronic device.
  3. 6. to grant authoritative permission or license to.
  4. 8. a device or unit that operates separately from the CPU but is connected to it, as a mouse, printer, speakers, etc
  5. 10. a very small, portable, solid-state hard drive that can be inserted into a USB port for storage and retrieval of data.
  6. 12. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system
  7. 15. A digital identity is the body of information about an individual, organization or electronic device that exists online. Unique identifiers and use patterns make it possible to detect individuals or their devices.
  8. 17. a website containing a writer's or group of writers' own experiences, observations, opinions, etc., and often having images and links to other websites.
  9. 18. acceptable use policy