SlideShare a Scribd company logo
Across Down 1. Duplicate that can be used if the original is lost, damaged, or 2. Private
combination of characters associated with the user destroyed name 4. Unauthorized and illegal
duplication of copyrighted software 3. Demands payment to stop an attack on an organization's
5. Useful to record, save, and execute keystrokes and instructions technology infrastructure
repeatedly 5. Programs that act without a user's knowledge and alter 6. Program that performs a
repetitive task on a network computer operations 7. Displays an online ads in a banner or pop-up
window on 9. Private combination of words associated with a user name webpages 10.
Compromised computers connected to a network and used to 8. Program that copies itself
repeatedly attack other networks 12. Consists of images displayed in motion 11. Small text file
that a web server stores on your computer 13. Technique used to make network or Internet
transmissions 14. Someone who accesses a computer or network illegally appear legitimate 16.
Compromised computer or device 15. The encrypted (scrambled) data in the encryption process
17. Program that hides in a computer and allows someone to take control of it 18. Destructive
event or prank 19. Online or Internet-based illegal acts 20. The unencrypted, readable data in the
encryption process

More Related Content

PDF
9.6 Computer Fraud and Abuse Techniques. Match the computer f.pdf
DOCX
Crime & technology
PPT
presentation on cyber crime and security
DOCX
Security terms & definitions
DOCX
Alpha Tech Module7 8 glossary
PDF
Information Security Lecture Notes
PPSX
Cyber security awareness presentation
9.6 Computer Fraud and Abuse Techniques. Match the computer f.pdf
Crime & technology
presentation on cyber crime and security
Security terms & definitions
Alpha Tech Module7 8 glossary
Information Security Lecture Notes
Cyber security awareness presentation

Similar to Across Down 1- Duplicate that can be used if the original is lost- dam.pdf (11)

PDF
cybersecurityawareness-presentation-170627121043.pdf
PPTX
digital / cyber powerpoint presentation with examples
PPTX
Unauthorized access and use
PPT
Cybercrime the emerging threat
PPTX
Cyber crime
PPTX
My presentation
PDF
Internet Safety Glossary of Terms
PPT
Cyber Security and Cyber Awareness
PPT
Cyber Crime
PPTX
Computer crime
PDF
Computer security
cybersecurityawareness-presentation-170627121043.pdf
digital / cyber powerpoint presentation with examples
Unauthorized access and use
Cybercrime the emerging threat
Cyber crime
My presentation
Internet Safety Glossary of Terms
Cyber Security and Cyber Awareness
Cyber Crime
Computer crime
Computer security

More from yrajjoshi (20)

PDF
Aiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdf
PDF
Albinism is an autosomal recessive trait- A man and woman (-the couple.pdf
PDF
Alan and Sara Winthrop are a married couple who file a joint income ta.pdf
PDF
Aim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdf
PDF
Air Quality and Fire Seasons California has experienced in the last 5.pdf
PDF
Air masses are large masses of air with and one for the temperature- D.pdf
PDF
Air Masses An air mass is a large mass of air that has similar charact.pdf
PDF
AHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdf
PDF
Age discrimination- The following table presents the numbers of employ.pdf
PDF
After two hyphae have determined they are compatible what is the next.pdf
PDF
After studying all night for a final exam- a bleary-eyed student rando.pdf
PDF
Additional informations 1- The aunket price of Concord's common stock.pdf
PDF
Additional information- 1- The common and preferred shares and stock o.pdf
PDF
Adipose tissue is found in the dermis the hypodermis tendons and ligam.pdf
PDF
Additional Information on Dec-31- 1- Accrued salaries at year-end are.pdf
PDF
Add a method removeOccurence(int e) that removes all occurrences of el.pdf
PDF
Activity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdf
PDF
Adapt the following menu for a person of the Orthodox Jewish faith-.pdf
PDF
Activitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdf
PDF
Activity Description ImmediatePredecessorOptimistic Most Probable Pess.pdf
Aiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdf
Albinism is an autosomal recessive trait- A man and woman (-the couple.pdf
Alan and Sara Winthrop are a married couple who file a joint income ta.pdf
Aim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdf
Air Quality and Fire Seasons California has experienced in the last 5.pdf
Air masses are large masses of air with and one for the temperature- D.pdf
Air Masses An air mass is a large mass of air that has similar charact.pdf
AHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdf
Age discrimination- The following table presents the numbers of employ.pdf
After two hyphae have determined they are compatible what is the next.pdf
After studying all night for a final exam- a bleary-eyed student rando.pdf
Additional informations 1- The aunket price of Concord's common stock.pdf
Additional information- 1- The common and preferred shares and stock o.pdf
Adipose tissue is found in the dermis the hypodermis tendons and ligam.pdf
Additional Information on Dec-31- 1- Accrued salaries at year-end are.pdf
Add a method removeOccurence(int e) that removes all occurrences of el.pdf
Activity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdf
Adapt the following menu for a person of the Orthodox Jewish faith-.pdf
Activitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdf
Activity Description ImmediatePredecessorOptimistic Most Probable Pess.pdf

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
advance database management system book.pdf
PPTX
Introduction to Building Materials
PDF
IGGE1 Understanding the Self1234567891011
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Types and Its function , kingdom of life
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Classroom Observation Tools for Teachers
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Hazard Identification & Risk Assessment .pdf
Supply Chain Operations Speaking Notes -ICLT Program
Computing-Curriculum for Schools in Ghana
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
advance database management system book.pdf
Introduction to Building Materials
IGGE1 Understanding the Self1234567891011
Weekly quiz Compilation Jan -July 25.pdf
A systematic review of self-coping strategies used by university students to ...
Indian roads congress 037 - 2012 Flexible pavement
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
RMMM.pdf make it easy to upload and study
Cell Types and Its function , kingdom of life
History, Philosophy and sociology of education (1).pptx
Classroom Observation Tools for Teachers
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
What if we spent less time fighting change, and more time building what’s rig...
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Hazard Identification & Risk Assessment .pdf

Across Down 1- Duplicate that can be used if the original is lost- dam.pdf

  • 1. Across Down 1. Duplicate that can be used if the original is lost, damaged, or 2. Private combination of characters associated with the user destroyed name 4. Unauthorized and illegal duplication of copyrighted software 3. Demands payment to stop an attack on an organization's 5. Useful to record, save, and execute keystrokes and instructions technology infrastructure repeatedly 5. Programs that act without a user's knowledge and alter 6. Program that performs a repetitive task on a network computer operations 7. Displays an online ads in a banner or pop-up window on 9. Private combination of words associated with a user name webpages 10. Compromised computers connected to a network and used to 8. Program that copies itself repeatedly attack other networks 12. Consists of images displayed in motion 11. Small text file that a web server stores on your computer 13. Technique used to make network or Internet transmissions 14. Someone who accesses a computer or network illegally appear legitimate 16. Compromised computer or device 15. The encrypted (scrambled) data in the encryption process 17. Program that hides in a computer and allows someone to take control of it 18. Destructive event or prank 19. Online or Internet-based illegal acts 20. The unencrypted, readable data in the encryption process