I.T Era

1234567891011121314
Across
  1. 2. a person who uses computers to gain unauthorized access to data.
  2. 4. is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
  3. 6. convert (information or data) into a cipher or code, especially to prevent unauthorized access.
  4. 9. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. 10. a small rodent that typically has a pointed snout, relatively large ears and eyes, and a long tail.
  6. 12. make (a coded or unclear message) intelligible.
  7. 13. an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
  8. 14. software that is available free of charge.
Down
  1. 1. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  2. 3. a panel of keys that operate a computer or typewriter.
  3. 5. is a type of malware that is often disguised as legitimate software.
  4. 6. commercial transactions conducted electronically on the Internet.
  5. 7. the practice of obtaining something, especially money, through force or threats.
  6. 8. are malicious programs that make copies of themselves again and again on the local drive, network shares, etc.
  7. 11. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.