Across
- 4. software used to view various kinds of Internet resources found on the Web
- 5. Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- 6. a list of citations that appear at the end of a paper, article, chapter or book.
- 10. An unauthorized person who secretly gains access to computer files
- 11. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Down
- 1. Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- 2. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- 3. Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
- 5. A bully who operates online, in cyberspace; To bully online
- 7. To renew or revitalize; To reload a webpage on the internet
- 8. Domain names come with different extensions of the web address based
- 9. the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
