Across
- 4. Executes instructions and controls the computer
- 8. Connects all computer components together
- 11. Inputs text into the computer
- 12. Locks files and demands payment
- 13. Websites accessed using the Internet
- 15. Temporary memory storing data in use
- 17. Detects and removes malware
- 19. Global network of computers
- 21. Extra verification step for security
Down
- 1. Portable storage device
- 2. Disguises itself as safe software
- 3. Attaches to files and spreads when opened
- 5. Small chunks data is split into
- 6. Spreads automatically across networks
- 7. Secretly collects user data
- 9. Permanent storage for data
- 10. Malicious software
- 14. Controls the pointer
- 16. Displays visual output
- 18. Scrambles data to keep it safe
- 20. Blocks unauthorised access
