Computer Concepts Module 6 Activity
Across
- 3. Prevents a user’s device from properly and fully functioning until a fee is paid.
- 6. Individuals who want to attack computers, but lack the knowledge of computers and networks needed to do so.
- 7. A malicious program that uses a computer network to replicate.
- 9. Involves the use of technology to stalk another person through email, text messages, phone calls, and other forms of communication.
Down
- 1. Malware that hides inside another program.
- 2. The process of scrambling information in such a way that it cannot be read unless the user possesses the key to unlock it back to a readable format.
- 4. The state or condition of being free from public attention to the degree that you determine.
- 5. The kind of theft that involves someone’s personal information, such as their name or credit card number, to commit financial fraud.
- 8. Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.
- 10. An applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.