Across
- 3. A form of online fraud that is usually an attempt to gain user’s personal information. Often done through emails
- 4. A program that can replicate itself by copying its source code into other programs
- 7. The smallest storage of data
- 9. RAM continues to be powered
- 11. It translate and execute each line of the program in turn
- 12. Software that installs itself on a computer and monitors and gathers personal or private information without the user’s knowledge
- 14. A malicious program that gets into a computer system disguised as some other type of ‘helpful’ program
- 15. Malicious program that replicates itself through computer networks executing its code in the computer’s memory in order to spread through other systems
- 17. System memory which holds vital systems information
Down
- 1. The size of pixels
- 2. Contents of RAM are copied to hard disk, hard disk saves a permanent copy
- 5. Temporary storage locations that are used to store data being transferred to or from memory
- 6. Gaining access to a computer system without permission
- 8. It go through source code one line at a time translating it
- 10. The largest size of data storage
- 13. Any software package that automatically shows advertisements in order to generate revenue for its author
- 16. The working space of the computer
