IT_Utsek_Dominik_12/B
Across
- 4. are malicious programs disguised as innocent looking files or embedded within legitimate software.
- 5. software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software
- 6. you have to choose a username or ------- that will indentify you during the chat
- 8. this capibility of mobile phones is called --------
- 11. the simultaneous use of at least two different devices or layers of security
- 14. After you have launched it, you must type the website address or ____
- 15. subdivisions pf a web page allowing the display of different HTML documents on the same page
Down
- 1. on your computer to connect to the ---- ------ the computer where meeting takes place
- 2. the celluar comes from the fact that the phone calls are made through ---- --------
- 3. Its called ----- or contact list
- 7. is a system that allows internet users to meet in channels
- 9. ---- and password and username
- 10. which may be displayed in a variety of sizes, styles and fonts
- 12. intented for the display of tabular date, but often used to create page layouts
- 13. are self copying programs that have the capacity to move from one computer to another