Tecnology

1234567891011
Across
  1. 2. in illicit software or programs that are downloaded to a
  2. 4. from one computer to another, a computer virus may
  3. 7. VIRUS
  4. 8. user’s hard disk.Computer viruses can be spread by attachments
  5. 9. a criminal offense that involves using the Internet
  6. 11. email messages,or instant messaging messages; disguised as
Down
  1. 1. monitoring, making threats, identity theft, damage
  2. 3. other technology to stalk or harass an individual, a group of
  3. 5. of imagesgreeting cards, or audio and video files,and
  4. 6. data or equipment.
  5. 7. or delete dataon a user’s computer, use an email program
  6. 10. software program that is designed to