Across
- 4. TYPE OF EMAIL FRAUD
- 6. A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- 7. ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- 12. SHORT FOR MALICIOUS SOFTWARE
- 14. to extract and decompress compressed files from it
- 15. REDUCE SIZE OF A FILE
- 16. A WAY OF SENDING MESSAGES OVER THE INTERNET
- 18. THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- 21. ANY PHYSICAL DEVICE ON YOUR COMPUTER
- 23. READ ONLY MEMORY
- 24. A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- 25. CONNECTED TO A NETWORK OR THE INTERNET
- 26. ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
Down
- 1. SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- 2. A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- 3. SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- 5. A point within a network that interconnects with other networks.
- 8. UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- 9. RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- 10. a security protocol used in wi-fi networks
- 11. A set of interconnected networks that allow computers in different locations to exchange information
- 13. A COMPUTERS MEMORY
- 17. COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- 18. CREATED BY ADOBE SYSTEMS INC
- 19. a security protocol used in wi-fi networks
- 20. CANNOT BE EDITED
- 22. DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- 24. MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS