Across
- 2. Standalone-malware-computer-program-that-replicates-itself-to-spread-to-other-computers
- 3. Collection-of-elements-or-components-that-bare-organized-for-a-common-purpose
- 6. Malware-or-malicious-software-infiltrates-your-computer
- 8. Program-or-file-that-is-harmful-to-a-computer-user
- 9. Messages-distributed-by-electronic-means-from-1-computer-user-to-one-or-more-recipients-via-a-network
- 10. A-malicious-individual-or-group-of-individuals-who-scam-users
- 11. A-cyber-attack-in-which-perpetrator-seeks-to-make-a-machine-or-network-resource-unavailable-to-its-intended-users-by-temporarily-or-indefinitely-disrupting-services-of-a-host-connected-to-the-internet
- 12. Problems-causing-a-program-to-crash-or-produce-invalid-output
- 14. Information-processed-or-stored-in-your-computer
Down
- 1. self-replicate-without-the-user’s-knowledge-and-can-perform-malicious-actions-insert-itself-onto-other-programs-files-infecting-them
- 3. A-program-that-enables-your-computer-to-perform-a-specific-task
- 4. Gulf-between-those-who-have-not-ready-access-to-computers-and-internet
- 5. Computer-programmed-to-prevent-detect-and-remove-viruses
- 7. Application-of-scientific-knowledge-for-practical-purposes
- 13. Malware-that-is-often-disguised-as-a-legitimate-software-to-gain-access-to-users-system
