Across
- 4. (4-4,4) is a persistent and ongoing process that a running antivirus suite undertakes. Each time a file is received, opened, downloaded, copied, or modified the process keeps the device safe from malicious software
- 6. (8,5) occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- 8. this is similar to an online journal and normally for public viewing computing and software manufacturers often have these to provide information on use research and development of their systems
- 10. (8,8) is a technology tool that helps internet users create, save, manage and use passwords across different online services.
- 11. (4,4) enables a virtual meeting or social network to take place regardless of individuals location on the globe they however can sometimes be unfriendly as they have inherent risks due to moderation being very light
Down
- 1. (5,7) is a mode of computer data storage in which digital data is stored on servers in off-site locations these are maintained by a third-party provider who is responsible for hosting managing and securing data stored on its infrastructure
- 2. stands for uniform resource locator and is the given term for a website address
- 3. (6,7)is the ability to connect with and use a faraway desktop computer from a separate computer remote desktop users can access their desktop open and edit files and use applications as if they were sitting at their desktop
- 5. is a website or dated by switch is contributed to by a community of users who work together to add content about a particular topic
- 7. is a video form of a blog
- 9. is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent. A strand of malware designed to access and damage a device without the user's consent.
