Digital Literacy-Aishani

123456789101112131415
Across
  1. 4. You should regularly do this for your data/photos.
  2. 6. Tries to open security holes in your computer so a hacker can gain access.
  3. 8. Keeps track of every key you type and sends it to the hacker.
  4. 10. When someone gets your personal information.
  5. 12. Tries to trick you into telling them your passwords or financial information. Usually in an email or through phone calls.
  6. 14. Blocks you from accessing your files until you pay a ransom
  7. 15. Computer activities often leave digital...
Down
  1. 1. Spies on you and steals information.
  2. 2. Displays ads on your computer.
  3. 3. Reads everyone’s data that is passing through a network Usually on public WiFi
  4. 4. A group of computers all being controlled by a remote hacker to perform illegal activity.
  5. 5. Where your data is housed online, keeping it safe from hard drive failures.
  6. 7. Protects your computer from malware
  7. 9. Malicious software that spreads between files on your computer, ruining them or your computer. Replicates itself
  8. 11. When people steal intellectual property such as movies, music andsoftware.
  9. 13. Spreads through networks and emails infecting as many computers as possible.