Across
- 4. The original author or creator of the work retains ownership of the work and has the exclusive right to reproduce and distribute the creative work.
- 5. hides within or is designed to look like a legitimate program
- 7. the use of a computer or network without permission.
- 9. a potentially damaging computer program designed to affect your computer negatively without your knowledge
- 10. are moral guidelines that govern the use of computers, networks, and information systems
- 12. acomputer program designed to protect your computer
- 13. security system consisting of hardware and/or software that prevents unauthorized access to data and info on a network
- 15. a malfunction of the computer
Down
- 1. ULTIMATE SAFEGUARD Against System Failures
- 2. A type of virus that uses macro language of an app (such as word processing or spreadsheet program) to hide virus codes. When the infected document is opened the macro virus loads into the memory.
- 3. A type of virus that inserts virus code into program files, then spreads to any program that accesses the infected file
- 6. A type of virus that replaces the boot program used to start the computer with a modified, infected version; it loads the virus into the computer's memory then
- 8. unsolicited email/newsgroup posting sent to many recipients/newsgroups at once.
- 11. a scam to obtain personal & financial information
- 14. a program that copies itself repeatedly using up resources and possibly shutting down the computer.
