Digital Information Technology Chapter 17

1234567891011121314151617181920212223242526272829
Across
  1. 2. computer code, often carried in a separate program, that can replicate itself to corrupt or otherwise harm either data files or the software used to process these files
  2. 5. seemingly innocent program that conceals malicious code that will be executed
  3. 9. activity by computer programmers to break into e-mails, websites, computer systems, and files of other computer users.
  4. 11. software used to detect and remove malicious software from a computer
  5. 12. software designed to cause enough anxiety that the computer user leaps at the chance to opt for a poor choice
  6. 13. collection of software that enables unauthorized access to a computer that is not normally permitted
  7. 15. manipulation or destruction of data found in cyberspace. It is unethical and can be illegal.
  8. 16. software application that automatically performs Internet-based activities; also known as a web robot
  9. 19. used to automatically route incoming e-mail to a specified inbox folder; also called rules
  10. 20. downloading copyrighted material without permission of the copyright holder
  11. 21. principles of what is right ad wrong that help people make decisions
  12. 22. software that secretly collects a user's data and behavior
  13. 23. device that joins two networks
  14. 24. phrase composed of real words on which a password is based
  15. 25. online threat in which a virus or other malware infects the computer and takes control of your web browser
  16. 27. code that functions similarly to a virus but is a standalone computer program that replicates itself in order to spread to other computers
  17. 29. act of limiting access to information or removing information to prevent the information from being seen
Down
  1. 1. (completely automated public Turing test to tell computers and humans apart) brief online test to determine whether the request for access comes from a computer or a human
  2. 3. illegal act that involves stealing someone's personal information and using that information to commit theft or fraud
  3. 4. software that intentionally performs actions to disrupt the operation of a computer system, collect private information, or otherwise harm the computer or user.
  4. 6. act of employing manipulative techniques designed to lure unwary computer users into launching an infected file or opening a link to an infected website
  5. 7. (UPS) device that protects computer systems and files against power surges and outages
  6. 8. small text file that websites put on the computer hard disk drive when a user visits the websites
  7. 10. controls traffic to an individual machine
  8. 13. type of malware that encrypts files or blocks the user's access to programs until the user pays to unlock them
  9. 14. message or window that appears on top of or under the page you are viewing.
  10. 17. password that is difficult for both computers and humans to crack
  11. 18. location of temporary files
  12. 26. software that creates advertisements designed to drive the user to another website
  13. 28. attempt to obtain sensitive information by appearing as a harmless request