Across
- 3. These have a high replication rate.
- 5. This is a security system that protects hardware and/or software
- 7. They steal the personal information of the user and send it to advertisers or third parties.
- 9. This virus have become less common as floppy disks have become rarer.
- 10. This is a set of commands written by the user to be executed later.
- 11. This is a destructive software program.
- 13. These don't replicate and they are the least harmful programmed threat.
Down
- 1. The name came from Greek mythology.
- 2. is the area of the computer that is accessed when the computer starts.
- 4. It claims to be something desirable.
- 6. These are hybrids, they behave like many other viruses and more than one type.
- 8. This is a virus that changes its code whenever it passes to another machine.
- 12. They consume a large part of the system memory.