Internet Technology Tutorial 6 & 7 Vocabulary Crossword
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
                                              
 
 
Down: 1) A profile on the Friendster online social network that is fictitious.2) Microsoft’s technology for writing small applications that perform actions in web pages.4) The internet protocol that handles news-feeds.5) Engaging in a racket.6) A software program or hardware device that controls access between two networks, such as a local area network and the internet or the internet and a computer.7) A subscription audio or video broadcast that is created and stored in a digital format on the internet.8) A feed format that is used to syndicate published content from one site to another.10) A common nickname for a micro blog posting that references the popular micro blogging site twitter.12) A multi-user program that allows exchange of short text messages over the internet in real time.13) A small program hidden inside another program that is created with the intent of causing damage. Across: 3) A computer attack in which email messages claiming to be from legitimate business direct recipients to a spoofed web site where the recipient is directed to provide sensitive information so the spoofed web site can steal the recipient’s personal information.9) A self-replication program that is usually hidden within another file and then sent as an email attachment; when the user opens the attachment, the virus infects the user’s computer, and then quickly attempts to send itself to email addresses stored in the address book of the user’s email program.11) A computer hacker who uses his or her talents for good results, such as to test or improve the security of a system.14) A way of scrambling and encoding data trans missions that reduces the risk that a person who intercepts the Web page as it travels across the internet will be able to decode and read the transmission’s contents.15) Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security for communications over networks such as the Internet.16) Using internet communications such as email, instant messages, or online social networks to harass, threatens, or intimidate someone.17) A public area of a Web site in which users chat.18) A number of computers into which a perpetrator has planted Trojan horses. The perpetrator can sell the entire group of infected computers online, often to an organized crime association that wants to launch attacks against competitors.19) Part of a web page that a developer codes so users can subscribe to it.20) A category of free software that displays advertisements to help pay for the program.21) Real-time communication on the internet that occurs between individuals who know each other and are invited to participate in the discussion.22) A means of communication with an operating system or some other program that is written by a programmer or developer with a specific goal in mind, such as displaying content on a screen or accessing a file system.23) A form of encryption that uses two different keys, a public key known to everyone and a private or secret key known only to the person who owns both keys.24) A type of blog that sends short messages, usually 140 characters or less, on a very frequent schedule.25) A trusted third party that verifies the identity of a person or organization in the process of issuing a digital certificate.26) An encrypted and password protected file that contains sufficient information to authenticate and prove a person’s or organization’s identity.27) A combination of the words folks and taxonomy that refers tot eh process of tagging internet content with keywords.
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type