Mauricio Guerrero

12345678910111213141516171819
Across
  1. 5. Malware is a general term for all such programs - it simply mean software, of whatever sort, written with a malicious intent.
  2. 6. A programming language.
  3. 8. A byte is a collection of eight bits, so called because if the pun with bit and bite.
  4. 11. Browser A program you use to look at, and navigate between, pages on the World Wide WEb.
  5. 12. Disk Space- is a more permanent store that holds files even when the computer is switched off.
  6. 13. A reboot requires that all software is completely reloaded.
  7. 14. Spyware is software that secretly monitors computer activity, attempting to gain private information without the computer user knowing.
  8. 16. Unsolicited email messages sent out in bulk and generally commercial in nature.
  9. 18. Bandwidth is an indication of how quickly data travels along a connection.
Down
  1. 1. A small text file sent to your computer by a web site you have visited.
  2. 2. The word modem was originally coined in the days when computers communicated by converting numbers into sounds that could then be transmitted over a regular telephone line.
  3. 3. CAPTCHA checks are the strings of letters and numbers that have to be typed in on some web pages before something can be saved.
  4. 4. is a rather vague term that refers to bandwidth somewhere above that of an old dial-up modem.
  5. 7. A virus is a piece of software that can copy itself and which attaches itself to some other program in order to survive and replicate.
  6. 9. A firewall is a piece of computer software or hardware that restricts the data that is allowed to flow through.
  7. 10. Bits is the smallest unit data of a computer.
  8. 11. A worm is similar but it can exist independently: it doesn’t need to attach to separate program.
  9. 15. Wide Web The World Wide Web System that operates via this writing. Web pages are transmitted via internet connections but there is more to the internet than just the web.
  10. 17. Unix command that provides information about users logging into a system.
  11. 19. is a piece of software that gains access to a computer by pretending to be benign or by hiding within some innocent-looking applications.