Impact of computer crimes

12345678910111213141516171819
Across
  1. 4. Apart from embedding data in music files, images, video or word-processing documents, Indian computer scientists developed an algorithm for embedding hidden data in an ... file.
  2. 6. The worm called Klez became the world's most widespread virus in 2002, hitting as many as one in every 300 e-mails, and ...ing as a simple e-mail attachment.
  3. 7. Wireless systems used by many hospitals to keep track of medical equipment can ... lifesaving devices and cause a fatal breakdown.
  4. 8. Of course, there are many rich men in the empire, but their money is buried, and they dress in rags and ... poverty (M.Twain).
  5. 12. Sophisticated network policies can be used to reduce the impact of ... , Flood Ping, and similar DoS type attacks.
  6. 13. In ..., the survivors meted out (покарать) to Donnelly the death he had earned by his treason (J.London).
  7. 14. Recently, a market of "second-hand software" has emerged in Europe as a result of ... of volume software license packages and resale of single licenses to software retailers.
  8. 17. The compony has recently joined The Original ... Manufacture's Association.
  9. 19. Our compony offers additional 10 percent off the price on ... purchases.
Down
  1. 1. To transfer data from a storage device into a computer's memory
  2. 2. A ... computer network is designed so that computers can send information directly to one another without passing through a centralized server
  3. 3. Customers are looking to ... the coffee house experience at home, stimulating sales of premium roasts, flavored coffees and blends.
  4. 5. The ... effect of all the dreadful sights which we had seen upon our journey was heavy upon my soul (Sir A. C. Doyle).
  5. 9. A letter laced with poisonous substance ricin, sent to US President Barack Obama, has been ..ed by the Federal Bureau of Investigation (FBI).
  6. 10. ... is illegal bebause a purchaser of software does not purchase ownership of it, but rather purchases the right to use the product.
  7. 11. One of the best ways to find great programs is by visiting sites that host ... programs and Demo versions.
  8. 15. The FBI has a ... that allows them to eavesdrop without a warrant on all cellphone conversations.
  9. 16. Philip felt ... to cry, but he clenched his teeth to prevent the sobs from escaping (W.S. Maugham).
  10. 18. ... officials gain access to homes in order to commit burglary.