XC Participation

1234567891011121314151617181920
Across
  1. 3. protected string
  2. 5. information
  3. 6. computer end life
  4. 8. file that stores information
  5. 9. wireless
  6. 10. system designed to prevent unauthorized access
  7. 11. bullying
  8. 12. unwanted
  9. 13. network of compromised computers
  10. 14. false email
  11. 15. technology for verifying human
  12. 18. powerful, upward movement
  13. 19. thieves
  14. 20. computer program
Down
  1. 1. from within
  2. 2. replicatations
  3. 4. process of ensuring
  4. 7. pattern of ridges
  5. 16. malicious
  6. 17. device