ECDL
- Created by: Elisabethhh
- Created on: 03-01-14 15:56
R | K | K | L | Q | W | G | D | V | Q | M | E | Q | R | C | B | D | O | X | O | Y |
Y | A | N | T | I | V | I | R | U | S | S | O | F | T | W | A | R | E | F | J | O |
T | M | G | I | G | B | L | G | R | S | T | Y | A | A | F | V | O | S | D | T | K |
O | V | K | T | W | V | X | A | R | L | N | B | M | A | Q | C | D | R | A | C | H |
K | N | D | R | E | Q | Q | I | I | I | L | R | Q | L | N | U | N | I | H | E | B |
C | K | Q | O | S | H | R | N | F | A | D | O | H | O | P | V | G | S | W | I | C |
T | X | I | J | E | U | O | B | U | M | I | I | R | G | J | H | C | S | W | P | W |
M | H | C | A | X | A | G | A | P | E | S | T | S | K | C | H | U | S | C | O | L |
J | I | J | N | A | P | U | C | O | N | I | M | T | E | O | S | D | V | V | R | I |
S | S | B | H | O | V | E | K | A | I | N | W | U | Y | P | E | A | A | B | D | D |
P | S | B | O | H | X | D | D | S | A | F | G | M | S | U | G | K | A | B | S | N |
Y | Y | T | R | S | D | I | O | T | H | E | B | O | T | N | X | O | C | D | S | G |
O | R | Q | S | U | G | A | O | H | C | C | L | L | R | E | S | L | J | P | W | N |
N | U | S | E | R | D | L | R | F | Q | T | V | G | O | F | F | X | B | J | D | I |
E | M | K | S | I | T | L | A | B | K | I | G | D | K | L | T | A | Y | B | J | G |
M | W | U | L | V | G | E | C | R | D | N | T | P | E | C | T | C | G | A | X | M |
A | S | D | V | Q | O | R | C | N | C | G | N | H | K | Y | G | K | Y | F | H | B |
I | B | I | T | X | S | S | E | Y | D | G | M | Y | S | E | G | M | J | M | Q | B |
L | J | K | Y | T | B | H | S | N | N | I | H | O | A | X | E | M | A | I | L | T |
Q | V | I | G | N | V | Q | S | I | R | M | U | C | D | I | U | F | J | Y | L | Y |
M | Y | T | W | G | S | B | Y | V | H | F | G | D | Q | X | A | K | R | G | B | V |
Clues
- A false email warning the recipient of a fake virus (5, 6)
- A program designed to attack your PC without authorisation (6, 6)
- A software that protects your computer from viruses (4, 5, 8)
- An action performed by anti-virus software to clean files with viruses (12)
- An email sent with a deliberate attempt to deceive someone (4, 5)
- Find unprotected pathways into a network system (4, 8, 6)
- Messages sent to persuade people to forward multiple copies of the message to many people (5, 6)
- Programs that call unauthorised to expensive numbers using your wifi. (5, 8)
- Record all keystrokes to find information such as passwords and credit card numbers (3, 9)
- To intercept and read email to find something that can be used as blackmail (3, 2, 5)
Comments
No comments have yet been made