Software
Across
- 4. then the......can easily
- 6. what hackers delete and steal for ransom at a later date
- 7. who can install antihacking lock
- 10. what does not have a protective mechanism
- 11. in the......and checks every file
- 15. which can provide protection against hackers
- 16. what hackers send to victims
- 18. who uses malware
- 19. synonim spyware
- 20. they...... Malware into the computer
Down
- 1. where it will either delete it....... Or you can
- 2. it is..... To detect
- 3. synonim system
- 5. what can damage the computer
- 8. antonym important
- 9. what to use every day
- 12. what antivirus software checks
- 13. the antivirus......in more details
- 14. which is usually used for hacking
- 17. antonym programs