Crossword Night
Across
- 3. Fraudulent activity that is done to steal confidential user information
- 5. third word in full form of www
- 7. interconnected computing devices that can exchange data and share resources with each other
- 8. ability of a message to be displayed in more than one form
- 10. a virtual-reality space in which users can interact with a computer-generated environment and other users
Down
- 1. Device created in 1822
- 2. A combination of a user's identification and password used to enter a network
- 4. protection
- 6. topic for first event of Geeks for geeks, UMIT Chapter
- 9. computer virus is ___