WhenWe Crossword Puzzles

Computer Terms Crossword Puzzle

 Make a Crossword Puzzle   Make a Word Search from a Reading Assignment   Make a Word Search from a List of Words 
 All Crossword Puzzles
 Technology Crossword Puzzles
 Technology Word Search Puzzles
 Young Kids Crossword Puzzles
 Older Children Crossword Puzzles
 Teenage Crossword Puzzles
 Adult Crossword Puzzles
 Simple Crossword Puzzles
 Easy Crossword Puzzles
 Moderately Challenging Crossword Puzzles
 Hard Crossword Puzzles
 Very Difficult Crossword Puzzles
 Big Crossword Puzzles
send to a friend

Computer Terms



      1                   2    
                               
      3                        
                               
    4                          
                               
                               
                               
  5                            
                               
                               
  6                            
                               
7                              
                      8        
      9                        
                               
                               
                               
                               
Across Down
1 (also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties.
3 a feature or defect of a computer system that allows surreptitious unauthorized access to data.
4 is the environmentally responsible and eco-friendly use of computers and their resources.
5 forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source.
6 form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels.
7 a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.
9 a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.
1 is a crime involving an attack or threat of attack coupled with a demand for money to avert or stop the attack.
2 computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.
8 software that automatically displays or downloads advertising material (often unwanted) when a user is online.
Answer
 
send to a friend
Make Your Own Crossword Free
Make Your Own Word Search Free