Computer Concepts Module 6 Activity

12345678910
Across
  1. 3. Prevents a user’s device from properly and fully functioning until a fee is paid.
  2. 6. Individuals who want to attack computers, but lack the knowledge of computers and networks needed to do so.
  3. 7. A malicious program that uses a computer network to replicate.
  4. 9. Involves the use of technology to stalk another person through email, text messages, phone calls, and other forms of communication.
Down
  1. 1. Malware that hides inside another program.
  2. 2. The process of scrambling information in such a way that it cannot be read unless the user possesses the key to unlock it back to a readable format.
  3. 4. The state or condition of being free from public attention to the degree that you determine.
  4. 5. The kind of theft that involves someone’s personal information, such as their name or credit card number, to commit financial fraud.
  5. 8. Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.
  6. 10. An applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.