Across
- 4. a program that copies itself repeatedly using up resources and possibly shutting down the computer
- 6. a potentially damaging computer program designed to affect your computer negatively without your knowledge
- 7. Any event or action that has the potential of causing a loss of computer equipment, software, data, and information, or processing capability.
- 9. Unsolicited email/newsgroup posting sent to many recipients/newsgroups at once
- 11. Uses macro language of an app (such as word processing or spreadsheet program) to hide virus codes
- 13. Illegal copying/use of Software
Down
- 1. Replaces the boot program used to start the computer with a modified, infected version
- 2. hides within or is designed to look like a legitimate program
- 3. some schools install locks and cables
- 5. Inserts virus code into program files, then spreads to any program that accesses the infected file
- 8. the use of a computer or network without permission. Hackers intrude by connecting through a modem and logging on as a user
- 10. security system consisting of hardware and/or software that prevents unauthorized access to data and info on a network
- 12. A scam to obtain personal & financial information