seth obadiah mckenney

123456789101112
Across
  1. 3. the unauthorized use, reproduction, distribution, or transmission of copyrighted material.
  2. 5. Software program that is designed to damage files on a computer that receives it. The virus spreads from file to file on a single computer, and does not intentionally try to move to another computer. It must replicate (reproduce) and execute itself to be defined as a virus. Since the virus reproduces itself, it can spread to other application and operating system software. Some viruses cause little or no damage (they are more of a nuisance because they place messages on the monitor, etc); however, other viruses can destroy the hard drive and render the computer unusable.
  3. 6. An unauthorized person who secretly gains access to computer files.
  4. 7. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
  5. 8. a piece of writing that has been copied from someone else and is presented as being your own work
  6. 11. A special computer used to store programs and files, and then sends it out to other computers one or all at a time. SPAM – unwanted/junk e-mail (usually of a commercial nature sent out in bulk)
  7. 12. HORSE Malicious software that is disguised as a useful application. It is sometimes called a “backdoor virus,” though it is not technically a virus.
Down
  1. 1. unwanted/junk e-mail (usually of a commercial nature sent out in bulk)
  2. 2. A bully who operates online, in cyberspace; To bully online
  3. 4. Software written and then donated to the public, so anyone is free to copy it and share it with their friends. Ownership of the software is retained by the owner/software developer who may choose to charge for future releases of the software.
  4. 9. Software that can be tried before you purchase.
  5. 10. Malicious software code that is designed to copy itself and intentionally move from computer system to computer system, via networks, internet etc. Unlike a true computer virus, a worm does not need a host file to move from one computer to the next; therefore, worms can spread more rapidly than viruses. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.