Data and information.
- Created by: M411H3W123
- Created on: 22-11-19 14:07
Q | U | R | G | U | K | S | I | N | Q | Q | T | Y | Q | H | F | M |
L | T | V | Q | N | K | V | Q | X | W | I | A | R | H | P | Y | G |
Q | Y | B | T | O | G | D | D | G | A | C | O | V | U | T | C | A |
N | K | B | V | Y | U | L | O | Y | U | T | B | X | R | F | F | R |
S | H | G | L | A | B | B | V | G | M | V | B | O | U | B | S | U |
U | L | A | P | G | F | Q | L | K | W | N | J | E | Y | N | C | J |
R | I | P | G | M | A | I | S | E | F | A | Y | M | Y | T | O | S |
I | E | R | B | H | R | X | K | P | N | S | G | E | S | L | O | U |
V | P | Y | Q | J | Q | Q | G | H | T | I | E | G | S | T | N | W |
U | B | S | M | F | G | C | O | C | V | Y | R | K | R | H | S | D |
Q | V | F | V | B | O | R | T | V | F | P | A | P | O | M | G | E |
E | F | X | W | O | S | F | G | F | E | M | W | Q | T | M | O | J |
P | M | T | E | E | A | V | T | I | R | R | Y | K | B | J | O | P |
W | O | F | W | T | L | L | J | O | C | A | P | G | A | S | K | O |
B | B | C | I | O | V | K | W | C | M | E | S | T | T | Y | D | Y |
J | L | W | U | K | C | O | N | D | B | I | Y | A | T | I | D | J |
A | R | W | S | I | R | F | A | H | B | B | O | R | L | T | E | Y |
Clues
- A mistake or error in a software program. (3)
- Code copies itself to corrupt a system / destroy data. (5)
- Collects personal data / monitors browsing activity. (7)
- Gains control over your computer. (3)
- Used by hackers to disguise itself as something else. (6, 5)
- Worms its way across computers leaving a copy in the memory of each one. (4)
Comments
No comments have yet been made