examples

1234567891011121314151617181920212223242526
Across
  1. 4. TYPE OF EMAIL FRAUD
  2. 6. A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
  3. 7. ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
  4. 12. SHORT FOR MALICIOUS SOFTWARE
  5. 14. to extract and decompress compressed files from it
  6. 15. REDUCE SIZE OF A FILE
  7. 16. A WAY OF SENDING MESSAGES OVER THE INTERNET
  8. 18. THE FASTER THE.... THE FASTER THE COMPUTER WORKS
  9. 21. ANY PHYSICAL DEVICE ON YOUR COMPUTER
  10. 23. READ ONLY MEMORY
  11. 24. A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
  12. 25. CONNECTED TO A NETWORK OR THE INTERNET
  13. 26. ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
Down
  1. 1. SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
  2. 2. A BARRIER THAT ACTS AS A COMPUTERS SECURITY
  3. 3. SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
  4. 5. A point within a network that interconnects with other networks.
  5. 8. UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
  6. 9. RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
  7. 10. a security protocol used in wi-fi networks
  8. 11. A set of interconnected networks that allow computers in different locations to exchange information
  9. 13. A COMPUTERS MEMORY
  10. 17. COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
  11. 18. CREATED BY ADOBE SYSTEMS INC
  12. 19. a security protocol used in wi-fi networks
  13. 20. CANNOT BE EDITED
  14. 22. DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
  15. 24. MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS