Across
- 1. is software created to damage or alter the computer data or its operations
- 3. are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks
- 6. Due to its anonymity, the Internet also provides the right environment
- 7. provides email and access to the Web via a normal TV set plus a high-speed modem
- 9. an International computer Network made up of thousands of networks linked together.
- 10. are malicious programs disguised as innocent-looking files or embedded within legitimate software.
Down
- 1. converts the digital signals stored in the computer into analogue signals that can be transmitted over telephone lines
- 2. software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software
- 4. orbiting the earth enable your computer to send and receive Internet files
- 5. or black-hat hackers, are computer criminals who use technology to perform a variety of crimes: virus propagation, fraud, intellectual property theft, etc.
- 8. are programs that spread by attaching themselves to executable files or documents.
