Across
- 2. Sending communications that appear to come from authentic source
- 3. Hardware/ software that keeps network safe
- 4. Unwanted and unsolicited message in the inbox of email
- 5. Files that are temporarily downloaded from a website
Down
- 1. It is a wireless connection - wireless fidelity
- 2. It is a key of codes that protects our email, document, or files safe
