The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Q2 W16 Crossword

NAME ___________________________________
P1     P2     P3     P4     P7     P8
Across
Hypertext Transfer Protocol; the data communication standard of web pages
the broad term to describe any malicious software designed by hackers
Hypertext Markup Language; the predominant markup language used for web pages
the point at which a word is broken at the end of a line of continuous text and a hyphen is inserted
the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
a physical device that provides a defense against hackers and directs content to the specific computer, device, streaming device or printer that should receive it
Internet Protocol Address; a unique set of numbers in a particular sequence that serves as a tracking device for every electronic device on the internet, including your cell phone
the preparation of an image for use on the web; typically involving compression
a financial report to shareholders of a public corporation
Role Playing Games; common name for MORGP
software that allows you to see pages on the world wide web
Hypertext Transfer Protocol Secure; indicates that the webpage has a special layer of encryption added to hide your personal information and passwords from others
the application of a distinct logotype and.or symbol to make a company or organization recognizable along with the marketing that imbues the company with a personality
a galaxy of networks connecting millions of computers
Down
World Wide Web; a service that allows you to access and share information using the internet's connectivity
Wide Area Network; a communications network that spans a large geographic area such as across cities, states, or countries
a special kind of hacker program that relies on the user to welcome it and activate it (named after the famous Trojan Horse story)
the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords/PINs
Massively Multiplayer Online Role-Playing Game; digital games designed to be played by thousands of participants all around the world via the internet (i.e. World of Warcraft, Second Life)
hairline marks at the corners of a printed page to help ensure color plates are aligned properly and to designate what will be cropped off in finishing
a style of arguing or persuading; a way of engaging a targeted audience
describes a range of designs from signage to booth design for exhibitions and conventions as well environmental design (billboards) with the purpose of creating awareness for the advertiser
a generic term to describe a barrier against destruction, consisting of software or hardware that protects your computer from hackers and viruses
larger, typically more bold typeface used for a book's title, chapter titles and other important text
a method for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, as opposed to a direct connection to a server
the mathematical scrambling of data so that it is hidden from would-be eavesdroppers
Internet Service Provider; the company that gets paid to provide access to the internet
Uniform Resource Locator; in short, a web address