Guess me ...

12345678910111213141516171819
Across
  1. 2. A small text file created a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk.
  2. 5. The processing of converting information or data into a code, especially to prevent unauthorized access
  3. 7. A regularly updated website or webpage , typically one run by an individual or small group, that is written in an informal way.
  4. 8. intelligence The ability of a computer program or a machine to think and learn.
  5. 13. A program or piece of software designed to fulfill a particular purpose.
  6. 14. The gaining of unauthorized access to data in a system or computer.
  7. 15. A type of software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
  8. 16. A software designed to detect and destroy computer viruses.
  9. 18. theft A crime in which an imposter obtains key pieces of personally identifiable information such as driver's license number, in order to impersonate someone else.
  10. 19. A computer program with a graphical user interface for displaying HTML files , used to navigate the World Wide Web.
Down
  1. 1. A type of malicious software program whose primary function is to infect other computers by duplicating itself to spread to uninfected computers.
  2. 2. A software program that transforms high level source code that is written by a developer in a high-leve programming language into a low level object code (binary code) in machine language, which can be understood by the processor.
  3. 3. Bullying that takes place over digital devices like cell phones , computers and tablets.
  4. 4. A form of blackmail in which sexual information or images are used to extort sexual favors from the victim.
  5. 6. A cyber-crime in which a target is contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details.
  6. 9. The amount of data that can be sent from one point to another in a certain period of time.
  7. 10. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
  8. 11. Information orocessed or stored by a computer
  9. 12. Software that is specifically designed to disrupt , damage or gain unauthorized access to a computer system.
  10. 17. A structured set of data held in a computer, especially one that is accessible in various ways.