Digital Media Unit One
Across
- 2. – A person who gains unauthorized access to data or systems.
- 5. – Designing equipment/workspaces to reduce strain or injury.
- 7. – Malware that spreads by attaching to other programs/files.
- 8. convention – A standard way to name files for organization.
- 10. horse – Malware disguised as legitimate software.
- 12. media – Content stored and shared in digital form, such as videos, images, and audio.
- 15. – Converting information into a code to prevent unauthorized access.
- 17. – Software that hides unauthorized access to a computer.
- 19. – Software that secretly monitors user activity.
Down
- 1. – A computer/system providing resources to other computers.
- 3. – Fraudulent attempts to obtain sensitive info by posing as a trustworthy source.
- 4. – Software/hardware that records keystrokes.
- 6. – Malicious software that harms or disrupts systems.
- 9. – Software that displays or downloads unwanted advertising material.
- 11. backup – Storing data on a remote server via the internet.
- 13. stress injury – Injury caused by repeated motion (e.g., typing).
- 14. – Malware that spreads without attaching to files.
- 16. engineering – Tricking people into giving up confidential info.
- 18. predator – A person who uses the internet to exploit or harm others.