ECDL

?
R K K L Q W G D V Q M E Q R C B D O X O Y
Y A N T I V I R U S S O F T W A R E F J O
T M G I G B L G R S T Y A A F V O S D T K
O V K T W V X A R L N B M A Q C D R A C H
K N D R E Q Q I I I L R Q L N U N I H E B
C K Q O S H R N F A D O H O P V G S W I C
T X I J E U O B U M I I R G J H C S W P W
M H C A X A G A P E S T S K C H U S C O L
J I J N A P U C O N I M T E O S D V V R I
S S B H O V E K A I N W U Y P E A A B D D
P S B O H X D D S A F G M S U G K A B S N
Y Y T R S D I O T H E B O T N X O C D S G
O R Q S U G A O H C C L L R E S L J P W N
N U S E R D L R F Q T V G O F F X B J D I
E M K S I T L A B K I G D K L T A Y B J G
M W U L V G E C R D N T P E C T C G A X M
A S D V Q O R C N C G N H K Y G K Y F H B
I B I T X S S E Y D G M Y S E G M J M Q B
L J K Y T B H S N N I H O A X E M A I L T
Q V I G N V Q S I R M U C D I U F J Y L Y
M Y T W G S B Y V H F G D Q X A K R G B V

Clues

  • A false email warning the recipient of a fake virus (5, 6)
  • A program designed to attack your PC without authorisation (6, 6)
  • A software that protects your computer from viruses (4, 5, 8)
  • An action performed by anti-virus software to clean files with viruses (12)
  • An email sent with a deliberate attempt to deceive someone (4, 5)
  • Find unprotected pathways into a network system (4, 8, 6)
  • Messages sent to persuade people to forward multiple copies of the message to many people (5, 6)
  • Programs that call unauthorised to expensive numbers using your wifi. (5, 8)
  • Record all keystrokes to find information such as passwords and credit card numbers (3, 9)
  • To intercept and read email to find something that can be used as blackmail (3, 2, 5)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all ECDL resources »