Across
- 3. Desktop is also known as.
- 6. Hiding one piece of data with in another.
- 7. The crime that related to computers and networks.
- 12. A piece of malware that can replicate itself in order to spread the infection to other connected computer without human interaction.
- 13. Secretly watches computer activity.
- 14. Phishing is malware that asks for ______ details.
- 17. Any program, website, or file that is defined to damage or gain unauthorized access to a device.
- 18. The practice of protecting systems, networks and programs from digital attacks.
Down
- 1. Someone who breaks into a computer system.
- 2. URLs that mislead the user into down leading a virus and visiting a harmful website.
- 4. Illegal production of copyrighted material is often referred as ____.
- 5. Information is also known as.
- 8. A form of malware that deliberately prevent u from accessing files in ur computer,until they are decrypted using at a cost.
- 9. Type of bullying that takes place online.
- 10. ____ is the ability to act in a safe and responsible manner on the internet and other connected environments.
- 11. An online threat that hides itself in computers and mobile device.
- 15. Software that protects computer from virus related harm.
- 16. Copying the data without the permission of owner of the computer/computers system/ computer network.