Impact of computer crimes
Across
- 4. Apart from embedding data in music files, images, video or word-processing documents, Indian computer scientists developed an algorithm for embedding hidden data in an ... file.
- 6. The worm called Klez became the world's most widespread virus in 2002, hitting as many as one in every 300 e-mails, and ...ing as a simple e-mail attachment.
- 7. Wireless systems used by many hospitals to keep track of medical equipment can ... lifesaving devices and cause a fatal breakdown.
- 8. Of course, there are many rich men in the empire, but their money is buried, and they dress in rags and ... poverty (M.Twain).
- 12. Sophisticated network policies can be used to reduce the impact of ... , Flood Ping, and similar DoS type attacks.
- 13. In ..., the survivors meted out (покарать) to Donnelly the death he had earned by his treason (J.London).
- 14. Recently, a market of "second-hand software" has emerged in Europe as a result of ... of volume software license packages and resale of single licenses to software retailers.
- 17. The compony has recently joined The Original ... Manufacture's Association.
- 19. Our compony offers additional 10 percent off the price on ... purchases.
Down
- 1. To transfer data from a storage device into a computer's memory
- 2. A ... computer network is designed so that computers can send information directly to one another without passing through a centralized server
- 3. Customers are looking to ... the coffee house experience at home, stimulating sales of premium roasts, flavored coffees and blends.
- 5. The ... effect of all the dreadful sights which we had seen upon our journey was heavy upon my soul (Sir A. C. Doyle).
- 9. A letter laced with poisonous substance ricin, sent to US President Barack Obama, has been ..ed by the Federal Bureau of Investigation (FBI).
- 10. ... is illegal bebause a purchaser of software does not purchase ownership of it, but rather purchases the right to use the product.
- 11. One of the best ways to find great programs is by visiting sites that host ... programs and Demo versions.
- 15. The FBI has a ... that allows them to eavesdrop without a warrant on all cellphone conversations.
- 16. Philip felt ... to cry, but he clenched his teeth to prevent the sobs from escaping (W.S. Maugham).
- 18. ... officials gain access to homes in order to commit burglary.