XC Participation
Across
- 3. protected string
- 5. information
- 6. computer end life
- 8. file that stores information
- 9. wireless
- 10. system designed to prevent unauthorized access
- 11. bullying
- 12. unwanted
- 13. network of compromised computers
- 14. false email
- 15. technology for verifying human
- 18. powerful, upward movement
- 19. thieves
- 20. computer program
Down
- 1. from within
- 2. replicatations
- 4. process of ensuring
- 7. pattern of ridges
- 16. malicious
- 17. device