IT_Utsek_Dominik_12/B

123456789101112131415
Across
  1. 4. are malicious programs disguised as innocent looking files or embedded within legitimate software.
  2. 5. software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software
  3. 6. you have to choose a username or ------- that will indentify you during the chat
  4. 8. this capibility of mobile phones is called --------
  5. 11. the simultaneous use of at least two different devices or layers of security
  6. 14. After you have launched it, you must type the website address or ____
  7. 15. subdivisions pf a web page allowing the display of different HTML documents on the same page
Down
  1. 1. on your computer to connect to the ---- ------ the computer where meeting takes place
  2. 2. the celluar comes from the fact that the phone calls are made through ---- --------
  3. 3. Its called ----- or contact list
  4. 7. is a system that allows internet users to meet in channels
  5. 9. ---- and password and username
  6. 10. which may be displayed in a variety of sizes, styles and fonts
  7. 12. intented for the display of tabular date, but often used to create page layouts
  8. 13. are self copying programs that have the capacity to move from one computer to another