Digital-Literacy-Kavon Stewart
Across
- 1. Something used to protect Against Viruses
- 4. Displays ads on your computer. May slow down your computer
- 5. make sure to ____ your software when Needed.
- 8. When someone gets your personal info and then does things pretending to be you.
- 10. When you copy someone's work and claim it as your own.
- 13. Emails that spread Malware often use _________.
- 16. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- 17. Everyone has a Digital _______ so be careful
- 18. you should regularly make _______ to make sure that your things will be safe.
- 20. Reads everyone’s data that is passing through a network. Usually on public WiFi.
- 22. Keeps track of every key you type and sends it to the hacker.
- 23. To ensure your data is safe you could us ______ storage.
Down
- 2. Spies on you, stealing information like passwords and credit card numbers
- 3. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- 6. avoid using ______ Wi-fi.
- 7. Spreads through networks and emails infecting as many computers as possible. Get it through email.
- 9. Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- 11. make sure to have strong an secure ________.
- 12. Blocks you from accessing your files until you pay a ransom.
- 14. __________ is when people steal intellectual property such as movies, music and software.
- 15. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- 18. A group of computers all being controlled by a remote hacker to perform illegal activity.
- 19. if you are being cyber bullied Don't _____ the messages because they can be used as proof
- 21. IF someone is completely _______ they cant be traced.