Tanisha R.

1234567891011121314
Across
  1. 2. Standalone-malware-computer-program-that-replicates-itself-to-spread-to-other-computers
  2. 3. Collection-of-elements-or-components-that-bare-organized-for-a-common-purpose
  3. 6. Malware-or-malicious-software-infiltrates-your-computer
  4. 8. Program-or-file-that-is-harmful-to-a-computer-user
  5. 9. Messages-distributed-by-electronic-means-from-1-computer-user-to-one-or-more-recipients-via-a-network
  6. 10. A-malicious-individual-or-group-of-individuals-who-scam-users
  7. 11. A-cyber-attack-in-which-perpetrator-seeks-to-make-a-machine-or-network-resource-unavailable-to-its-intended-users-by-temporarily-or-indefinitely-disrupting-services-of-a-host-connected-to-the-internet
  8. 12. Problems-causing-a-program-to-crash-or-produce-invalid-output
  9. 14. Information-processed-or-stored-in-your-computer
Down
  1. 1. self-replicate-without-the-user’s-knowledge-and-can-perform-malicious-actions-insert-itself-onto-other-programs-files-infecting-them
  2. 3. A-program-that-enables-your-computer-to-perform-a-specific-task
  3. 4. Gulf-between-those-who-have-not-ready-access-to-computers-and-internet
  4. 5. Computer-programmed-to-prevent-detect-and-remove-viruses
  5. 7. Application-of-scientific-knowledge-for-practical-purposes
  6. 13. Malware-that-is-often-disguised-as-a-legitimate-software-to-gain-access-to-users-system