IT

12345678910
Across
  1. 1. is software created to damage or alter the computer data or its operations
  2. 3. are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks
  3. 6. Due to its anonymity, the Internet also provides the right environment
  4. 7. provides email and access to the Web via a normal TV set plus a high-speed modem
  5. 9. an International computer Network made up of thousands of networks linked together.
  6. 10. are malicious programs disguised as innocent-looking files or embedded within legitimate software.
Down
  1. 1. converts the digital signals stored in the computer into analogue signals that can be transmitted over telephone lines
  2. 2. software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software
  3. 4. orbiting the earth enable your computer to send and receive Internet files
  4. 5. or black-hat hackers, are computer criminals who use technology to perform a variety of crimes: virus propagation, fraud, intellectual property theft, etc.
  5. 8. are programs that spread by attaching themselves to executable files or documents.