2

123456789101112131415161718192021222324252627282930
Across
  1. 2. the company that produces Macs and other computing products
  2. 5. the use of the internet for software and other resources
  3. 10. a word or phrase that makes a computer perform an operation
  4. 12. a small application that is embedded in a webpage
  5. 14. changing computer to your needs
  6. 17. to make copies
  7. 18. any type of media used on a webpage, including images and videos
  8. 20. a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
  9. 22. an action that results in the loss of another person’s property
  10. 25. a filter that prevents harmful software from leaving a network
  11. 27. a person who exploits computer hardware and software for their own purposes
  12. 29. a software that keeps a computer safe from threats such as computer viruses and cyber crimes
  13. 30. tricking people into giving information through email
Down
  1. 1. to modify or arrange something so that it works in a certain way
  2. 3. a measurement of how quickly a computer works
  3. 4. device that converts mechanical information into electronic signals
  4. 6. how users communicate with a computer
  5. 7. a personal website maintained by an individual
  6. 8. to work at a location away from a main office by using technology
  7. 9. a computer virus that copies its code over and destroys the files of the original data
  8. 11. a piece of code that is used to fix a flaw in a computer program
  9. 13. a filter that prevents harmful software from entering a network
  10. 15. a program that restricts access on a network
  11. 16. to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
  12. 19. the proces of stealing another person’s information and using it for personal gain
  13. 21. a person who uses computers and the internet to commit crimes
  14. 23. using a legitimate-looking website to trick people
  15. 24. a set of rules that must be followed for the sake of security
  16. 26. a collection of icons or pictures that have been organized in a file or page
  17. 28. to make sure that it is legitimate