Across
- 6. records that are used to indentify people by a physical attribute that dosen't change
- 8. valuable data that you wouldn't want to be stolen or currupted
- 9. when someone uses mobile phone text messages to lure people into returning the call
- 11. when one job is shared between two or more workers
- 12. where data and programs are stored in a centralised place on the internet and not on the hard drive of your computer
- 14. a program that searches for and identifies items in a database to match the keywords that you typed in
- 16. when people change their jobs by learning the new skills necessary for another job
- 17. type of virus that can records the activities of the user, such as password and transmit this information to the person who wrote the malware
- 18. a criminal activity trying to find sensitive information
- 20. data relating to a living individual
Down
- 1. extending the number of working hours in a day in order to decrease the number of day spent at work during a working week or two
- 2. a program that causes any clicks that you make on a website to be redirected to another website without you knowing
- 3. when too many electrical items are plugged into one socket causing more current to be put across an electrical wire or circuit than it can handle
- 4. when fraudsters obtain personal details of a victim through their landline telephone
- 5. the code that is used to secure your account
- 7. a pair of files that are kept in your computer
- 10. any attempt to gain unauthorised access to data in a computer system
- 13. a network of computers that allows an attacker to control them and use them to gather personal information
- 15. a protective barrier between your computer and any other computers that you are connected to
- 19. when people who have been doing a skilled type of job are replaced by technology operators
- 21. a protocol for managing the security of a message transmission on the internet
