GCSE ICT 4.1
- Created by: Moreamix
- Created on: 08-05-19 08:52
C | O | J | E | A | J | A | C | Y | V | K | Y | W | J | X | Y | T |
S | S | M | X | M | H | Y | A | X | O | J | M | V | V | V | B | T |
M | E | T | R | O | J | A | N | H | O | R | S | E | E | H | H | J |
Q | R | T | X | T | V | Y | J | B | Q | Q | I | W | R | M | I | S |
K | A | S | X | Q | V | V | P | D | S | K | D | Q | A | W | P | J |
O | W | T | O | A | M | B | X | A | C | T | V | N | W | O | T | X |
N | D | O | M | I | P | B | U | U | G | O | R | M | M | R | P | M |
I | A | S | P | Y | W | A | R | E | N | B | Y | R | O | M | B | N |
O | U | G | D | N | I | L | J | J | L | G | V | X | S | B | N | V |
N | D | O | S | Q | E | D | V | G | T | R | L | V | N | W | S | V |
J | G | W | X | G | Y | I | B | J | A | F | Q | J | A | N | U | D |
F | D | U | K | Q | P | U | C | P | G | O | O | I | R | D | A | T |
C | L | W | W | W | G | R | O | O | T | K | I | T | R | U | G | O |
O | X | K | I | R | O | W | D | M | E | A | H | A | F | T | F | D |
X | F | Q | V | I | R | U | S | G | S | R | I | G | Q | J | Q | Y |
L | W | C | R | Y | U | J | N | A | K | T | J | H | F | R | G | C |
P | T | V | R | D | G | Y | S | R | L | J | I | N | U | S | A | L |
Clues
- A mistake or error in a software program. (3)
- Advertising software: shows banners or pop-ups when online (6)
- Can block access to a system until money is paid (10)
- Code copies itself to corrupt a system/destroy data. (5)
- Collects personal data / monitors browsing activity. (7)
- Software tools allows access to your computer without being detected. (7)
- Used by hackers, it disguises itself as something else. (6, 5)
- Web Robot: gains control over your computer. (3)
- Worms its way across computers leaving a copy in the memory of each one. (4)
Comments
Report