Across
- 3. It is used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system.
- 5. It is slang commonly used to describe junk e-mail on the Internet.
- 6. It is a process that ensures and confirms a user’s identity
- 8. It is a malware computer program that replicates itself in order to spread to other computers.
- 9. It is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
- 10. It is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet
Down
- 1. These are small files which are stored on a user’s computer. It provide a way for the website to recognize you and keep track of your preferences
- 2. These refers to any video in which faces have been either swapped or digitally altered, with the help of AI
- 3. It is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by a common type of malware
- 4. It refers to a flaw in a system that can leave it open to attack.
- 7. It refers to any piece of software or application that displays advertisements on your computer.
