Across
- 3. What do you call Hackers attacking the companies, network etc
- 7. Starts with an R, a Hackers askes for money to unlock your files ?
- 9. This is harmful on your computer
- 12. What do you type to login into your computer?
- 13. Scammer sends you an email, what is it called?
- 14. Starts with an 'm' a software that is harmful to your device
Down
- 1. You type on it
- 2. You install A_ _ _ V _ _ _ _
- 4. Starts with a C_ _ _ _ b _ _ _ _ _ _ _ to communicate online to bully someone
- 5. Starts with an E which encodes your texts before its sent over to other parties.
- 6. You use it to move around on the screen
- 8. monitor incoming and outgoing traffic
- 10. Starts with M_ _ _ _ C _ _ _ telecommunications method which encodes text characters
- 11. is a type of challenge–response test used in computing to determine whether you're a human or robot.