Across
- 2. Malware that collects information on user browser habits without their consent
- 3. It is a security system designed to protect a network against external threats
- 5. _____ reader reads aloud information from a computer display, for users with impaired vision
- 6. Don't choose a password that can be found in a _______
- 8. Screen _________ displays enlarged screen content
- 9. High ______ makes the screen easier to view for users
- 11. Self-replicating malware that uses a computer network to send copies of itself to other computers
- 12. Discarded electronic parts or components, whether they are broken or merely out-dated.
Down
- 1. It is malicious software designed to install itself on a computer without the owner’s consent
- 4. Voice ________ software translates voice commands and is used in place of a mouse and keyboard
- 7. Intrusive programs that infect computer files and may cause damage
- 10. Destructive program that masquerades as an application.
