Across
- 2. Usually used to harm a user’s computer system, this virus modifies or completely changes one of a computer’s macro, a piece of code that is also a set of instructions that would automatically expand into a more extensive set of commands that will lead to the performance of a certain task. (It will cause a sequence of actions to be performed automatically).
- 3. A program that gathers and steals information about a user (i.e. their passwords, interests, personal information) through the monitoring of their browsing activities (i.e. their history). This information can be saved so that it can be recovered on a later date. The invasive tracking that this type of program does is not always done with the user knowing.
- 7. A virus that is contained within and transmitted via the opening of an attachment (an attached document) of an e-mail.
- 9. A virus that infects a system using a combination of characteristics of multiple types of viruses. This virus can be quite difficult to eliminate, and unless is completely gotten rid of, will frequently reinfect the system.
- 11. A program that changes a person’s computer browsing settings (i.e. adding extensions to browsers). Such changes will redirect the user to internet sites that they have no intention of visiting.
- 12. A virus that takes place due to the misuse of a website’s code that can then follow through to infecting a computer. This virus often occurs due to code being placed into a site without the website’s technician knowing.
- 13. A program that is able to copy or load itself into a computer system and run against the user’s wishes, often by causing damage to the computer by discarding data or corrupting the system.
- 16. A virus that is often spread from one system to another through an e-mail or website that has been hacked. At times, this virus can be attached to legitimate files and can be spread when a user launches a specific program. The user is typically unaware that there is a virus attached.
- 18. Often invisible to the user, this virus can duplicate and occur in a system’s recently used (Active) memory. Despite its self replicating nature, it doesn’t modify any files.
Down
- 1. A virus that will, by overwriting files with its own code, completely take over and disrupt a program’s original code.
- 4. Irrelevant messages sent to a large group of people over the internet.
- 5. A virus that affects a computer’s entire directory system by changing the path that specifies the location of files. Typically located in a disk.
- 6. Any defects, or “weak” spots found in a program that are often advantageously used by viruses as a way to infect a system.
- 8. A common consequence of pirated content, this infector is a virus that will damage the hard drive or floppy disk. Typically transmitted through the floppy disk of those already infected, this virus has the ability to go undetected by the system and the user, as well as alter the storage drive’s volume label.
- 9. A virus that hide in RAM and would typically install themselves into the computer’s memory.
- 10. A program that contains harmful code in what appears to be harmless data, but can actually gain control and infect with its chosen form of damage, such as the appearance of unwanted pop ups. This virus often results after downloading pirated files.
- 11. A flaw in a program.
- 14. A virus that attacks the file allocation table (FAT) and can result in severe damage to a computer.
- 15. A virus that changes its binary signature, the unique code that identifies a document, every time it damages a new file.
- 17. This virus does not alter any files but instead will create a copy of the file and will place a different extension on it. (i.e. .com)
