Chapter 8 Quiz, Taylor Moua

12345678910111213
Across
  1. 4. a program that copies itself repeatedly using up resources and possibly shutting down the computer
  2. 6. a potentially damaging computer program designed to affect your computer negatively without your knowledge
  3. 7. Any event or action that has the potential of causing a loss of computer equipment, software, data, and information, or processing capability.
  4. 9. Unsolicited email/newsgroup posting sent to many recipients/newsgroups at once
  5. 11. Uses macro language of an app (such as word processing or spreadsheet program) to hide virus codes
  6. 13. Illegal copying/use of Software
Down
  1. 1. Replaces the boot program used to start the computer with a modified, infected version
  2. 2. hides within or is designed to look like a legitimate program
  3. 3. some schools install locks and cables
  4. 5. Inserts virus code into program files, then spreads to any program that accesses the infected file
  5. 8. the use of a computer or network without permission. Hackers intrude by connecting through a modem and logging on as a user
  6. 10. security system consisting of hardware and/or software that prevents unauthorized access to data and info on a network
  7. 12. A scam to obtain personal & financial information