seth obadiah mckenney
Across
- 3. the unauthorized use, reproduction, distribution, or transmission of copyrighted material.
- 5. Software program that is designed to damage files on a computer that receives it. The virus spreads from file to file on a single computer, and does not intentionally try to move to another computer. It must replicate (reproduce) and execute itself to be defined as a virus. Since the virus reproduces itself, it can spread to other application and operating system software. Some viruses cause little or no damage (they are more of a nuisance because they place messages on the monitor, etc); however, other viruses can destroy the hard drive and render the computer unusable.
- 6. An unauthorized person who secretly gains access to computer files.
- 7. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- 8. a piece of writing that has been copied from someone else and is presented as being your own work
- 11. A special computer used to store programs and files, and then sends it out to other computers one or all at a time. SPAM – unwanted/junk e-mail (usually of a commercial nature sent out in bulk)
- 12. HORSE Malicious software that is disguised as a useful application. It is sometimes called a “backdoor virus,” though it is not technically a virus.
Down
- 1. unwanted/junk e-mail (usually of a commercial nature sent out in bulk)
- 2. A bully who operates online, in cyberspace; To bully online
- 4. Software written and then donated to the public, so anyone is free to copy it and share it with their friends. Ownership of the software is retained by the owner/software developer who may choose to charge for future releases of the software.
- 9. Software that can be tried before you purchase.
- 10. Malicious software code that is designed to copy itself and intentionally move from computer system to computer system, via networks, internet etc. Unlike a true computer virus, a worm does not need a host file to move from one computer to the next; therefore, worms can spread more rapidly than viruses. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.