Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

Vocabulary

Breanna Beecher

1         2
   
3   4  
       
5                          
       
  6     7            
         
          8
         
         
         
       
     
     
9            

Across
1.a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
5.Computer security is information security as applied to computers and networks.
6.Data theft is a growing problem primarily perpetrated by office workers with access to technology such as desktop computers and hand-held devices capable of storing digital information such as USB flash drives, iPods and even digital cameras
9.a statement of an intention to inflict pain, injury, damage, or other hostile action on someone in retribution for something done or not done.
Down
1.the state of being vulnerable or exposed; "his vulnerability to litigation"; "his exposure to ridicule"
2.is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.
3.use a computer to gain unauthorized access to data in a system.
4.the fraudulent appropriation and use of someone's identifying or personal data or documents, as a credit card.
7.to blame or abuse violently or bitterly.
8.to try to obtain financial or other confidential information from Internet users, typically by sending an e-mail that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake website that replicates the real one.

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us Blog