1:00
Click the first and last characters of the items you find.
en
WO
39
antivirus : ______ software is a type of utility software that can look for and eradicate viruses, Trojan horses, bots, and worms.
backdoor : A ______ allows remote hackers to download and execute files on your computer, upload a list of other infected computers, and use your computer as a relay station for breaking into other computers.
backup : a copy of one or more files that has been made in case the original files become damaged
blended : Virus experts use the term ______ threat to describe threats that combine more than one type of malicious program.
bot : Any software that can automate a task or autonomously execute a task when commanded to do so is called an intelligent agent or ______ since the software’s behavior mimics a robot. They have become the biggest threat because they can form ___nets that can launch widescale Denial of Service attacks and distribute mountains of spam.
buffer : technical jargon for a region of memory that holds data waiting to be transferred from one device to another
command line : this type of interface requires users to type memorized commands to run programs and accomplished tasks [two words]
commercial : ______ software is typically sold in computer stores or at Web sites.
copyright : a form of legal protection that grants the author of an original “work” an exclusive right to copy, distribute, sell, and modify that work
Denial of Service : A ______ ___ ______ attack is designed to generate a lot of activity on a network by flooding its servers with useless traffic that is enough to overwhelm the server’s processing capability and essentially bring all communications to a halt.
end user : this license agreement is displayed on-screen when you first install software [two words]
freeware : ______ is copyrighted software that is available for free.
GUI : this type of interface provides a way to point and click a mouse to select menu options and manipulate graphical objects displayed on the screen [acronym]
hacker : a person who uses a computer to gain unauthorized access to data, steal information, distribute viruses, or crash systems
kernel : the core part of the operating system
keylogger : Trojan horses are notorious for stealing passwords using a ______, which is a type of program that records your keystrokes.
Linux : a Unix-like computer operating system assembled under the model of free and open source software development and distribution
Mac OS : GUI-based operating system developed by Apple, Inc. [two words]
malware : refers to any program or set of program instructions designed to surreptitiously entre a computer and disrupt its normal operations
mass mailing : A ______ ______ worm spreads by sending itself to every address in the address book of an infected computer. It often includes an attachment that contains the worm.
Microsoft Windows : GUI-based operating system developed by Microsoft Corporation [two words]
open source : ______ ______software makes the uncompiled program instructions (source code) available to programmers who want to modify and improve the software.
patch : A software ______ is a small section of program code that replaces part of the software you currently have installed.
payload : In addition to replicating itself, a virus might deliver a ______, which could be as harmless as displaying an annoying message or as devastating as corrupting the data on your computer’s hard disk.
public domain : ______ ______ software is available for public use without restriction except that it cannot be copyrighted.
retro : Malicious programs called ______ viruses are designed to attack antivirus software by deleting the files that contain virus descriptions or corrupting the main executable virus-scanning program.
service pack : a set of patches that correct problems and address security vulnerabilities [two words]
shareware : ______ is copyrighted software marketed under a “try before you buy” policy (free trial).
signature : A virus ______ is a section of program code that can be used to identify a known malicious program.
social : Hackers have become proficient at using “______ engineering” techniques to make e-mail messages and their attachments seem legitimate.
software license : a legal contract that defines the ways in which you may use a computer program [two words]
spoofed : Mass-mailing worms are difficult to track because the “From” line of the infected message contains a ______ address of a randomly selected person with a valid address from the address book rather than the address of the computer that actually sent the mail.
Trojan horse : a computer program that seems to perform one function while actually doing something else [two words]
Unix : a multitasking, multi-user computer operating system originally developed in assembly language in 1969 by a group of AT&T employees at Bell Labs
unzipped : refers to files that have been uncompressed or reconstituted into the original collection of files
user interface : the combination of hardware and software that helps people and computers communicate with each other [two words]
virus : A computer ______ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.
worm : Unlike a virus, which is designed to spread from file to file, a ______ is designed to spread from computer to computer. Most of them take advantage of communications networks (mainly the Internet).
zipped : refers to one or more files that have been compressed to decrease size and reduce download time
R | Q | N | W | Q | J | T | G | M | I | C | R | O | S | O | F | T | W | I | N | D | O | W | S | C | M |
C | F | A | M | H | V | R | Y | U | W | E | K | Y | C | X | L | J | U | N | Z | I | P | P | E | D | M |
O | M | S | L | T | K | X | Q | Y | I | T | E | X | J | V | T | F | R | O | Y | E | R | S | W | C | A |
M | A | A | P | U | B | L | I | C | D | O | M | A | I | N | F | D | Y | E | R | T | N | U | M | W | E |
M | S | T | P | P | M | L | W | Q | A | R | K | Q | B | H | H | C | Y | A | T | E | N | D | J | S | N |
A | S | D | D | I | P | I | F | T | A | K | G | L | N | N | G | B | W | V | C | R | E | A | K | A | D |
N | M | J | K | M | L | N | C | C | Y | E | Z | S | H | C | Y | E | O | I | R | P | O | U | D | I | U |
D | A | Y | E | Q | A | U | S | O | V | Y | L | E | S | E | E | S | L | T | P | E | J | I | S | O | S |
L | I | K | R | N | U | X | E | M | C | L | Y | U | K | R | M | E | P | I | M | E | I | U | P | B | E |
I | L | A | N | K | E | F | R | M | S | O | S | A | F | X | R | L | Z | O | I | O | N | N | B | K | R |
N | I | P | E | M | N | D | V | E | J | G | B | V | H | A | A | G | W | Q | O | K | S | I | U | Y | Z |
E | N | J | L | D | C | K | I | R | C | G | I | N | W | I | F | M | A | O | I | F | Z | X | F | Q | M |
G | G | I | O | E | S | W | C | C | O | E | Y | T | C | D | A | A | T | H | R | K | E | E | F | E | V |
S | G | U | I | U | H | K | E | I | S | R | F | O | G | L | C | L | L | P | I | M | C | D | E | F | Y |
B | S | Z | R | R | F | T | P | A | Y | O | S | B | A | H | T | W | O | K | V | A | E | T | R | U | U |
U | M | I | S | O | W | Z | A | L | S | R | C | Q | G | Y | I | A | V | P | F | S | N | M | A | W | O |
H | V | R | F | W | G | G | C | M | S | H | A | R | E | W | A | R | E | R | R | L | K | A | K | W | P |
S | S | I | U | F | O | M | K | X | H | A | C | K | E | R | Z | E | E | O | L | I | H | C | H | H | E |
P | A | Y | L | O | A | D | K | X | U | O | F | O | T | M | H | T | H | C | E | P | A | O | I | C | N |
W | M | O | E | K | I | C | B | U | W | B | L | L | R | P | N | N | E | J | U | V | P | S | G | C | S |
O | Q | Z | L | E | E | W | E | Z | P | P | F | F | P | I | A | E | Y | K | K | P | H | Y | E | F | O |
K | B | L | E | N | D | E | D | G | Z | S | R | E | R | J | Y | T | C | G | F | U | Z | D | E | Z | U |
W | I | T | M | K | F | O | O | X | K | U | Z | E | O | V | B | A | C | K | D | O | O | R | A | G | R |
G | U | C | O | P | Y | R | I | G | H | T | S | R | L | V | B | X | T | H | B | B | S | M | P | L | C |
L | A | N | T | I | V | I | R | U | S | U | T | J | N | A | S | I | G | N | A | T | U | R | E | E | E |
D | E | N | I | A | L | O | F | S | E | R | V | I | C | E | I | C | D | L | O | P | B | V | T | R | P |
- Any software that can automate a task or autonomously execute a task when commanded to do so is called an intelligent agent or ______ since the software’s behavior mimics a robot. They have become the biggest threat because they can form ___nets that can launch widescale Denial of Service attacks and distribute mountains of spam.
- this type of interface provides a way to point and click a mouse to select menu options and manipulate graphical objects displayed on the screen [acronym]
- a multitasking, multi-user computer operating system originally developed in assembly language in 1969 by a group of AT&T employees at Bell Labs
- Unlike a virus, which is designed to spread from file to file, a ______ is designed to spread from computer to computer. Most of them take advantage of communications networks (mainly the Internet).
- a Unix-like computer operating system assembled under the model of free and open source software development and distribution
- GUI-based operating system developed by Apple, Inc. [two words]
- A software ______ is a small section of program code that replaces part of the software you currently have installed.
- Malicious programs called ______ viruses are designed to attack antivirus software by deleting the files that contain virus descriptions or corrupting the main executable virus-scanning program.
- A computer ______ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.
- a copy of one or more files that has been made in case the original files become damaged
- technical jargon for a region of memory that holds data waiting to be transferred from one device to another
- a person who uses a computer to gain unauthorized access to data, steal information, distribute viruses, or crash systems
- the core part of the operating system
| - Hackers have become proficient at using “______ engineering” techniques to make e-mail messages and their attachments seem legitimate.
- refers to one or more files that have been compressed to decrease size and reduce download time
- Virus experts use the term ______ threat to describe threats that combine more than one type of malicious program.
- this license agreement is displayed on-screen when you first install software [two words]
- refers to any program or set of program instructions designed to surreptitiously entre a computer and disrupt its normal operations
- In addition to replicating itself, a virus might deliver a ______, which could be as harmless as displaying an annoying message or as devastating as corrupting the data on your computer’s hard disk.
- Mass-mailing worms are difficult to track because the “From” line of the infected message contains a ______ address of a randomly selected person with a valid address from the address book rather than the address of the computer that actually sent the mail.
- A ______ allows remote hackers to download and execute files on your computer, upload a list of other infected computers, and use your computer as a relay station for breaking into other computers.
- ______ is copyrighted software that is available for free.
- refers to files that have been uncompressed or reconstituted into the original collection of files
- ______ software is a type of utility software that can look for and eradicate viruses, Trojan horses, bots, and worms.
- a form of legal protection that grants the author of an original “work” an exclusive right to copy, distribute, sell, and modify that work
- Trojan horses are notorious for stealing passwords using a ______, which is a type of program that records your keystrokes.
| - ______ is copyrighted software marketed under a “try before you buy” policy (free trial).
- A virus ______ is a section of program code that can be used to identify a known malicious program.
- ______ software is typically sold in computer stores or at Web sites.
- ______ ______software makes the uncompiled program instructions (source code) available to programmers who want to modify and improve the software.
- this type of interface requires users to type memorized commands to run programs and accomplished tasks [two words]
- A ______ ______ worm spreads by sending itself to every address in the address book of an infected computer. It often includes an attachment that contains the worm.
- a set of patches that correct problems and address security vulnerabilities [two words]
- a computer program that seems to perform one function while actually doing something else [two words]
- ______ ______ software is available for public use without restriction except that it cannot be copyrighted.
- the combination of hardware and software that helps people and computers communicate with each other [two words]
- A ______ ___ ______ attack is designed to generate a lot of activity on a network by flooding its servers with useless traffic that is enough to overwhelm the server’s processing capability and essentially bring all communications to a halt.
- a legal contract that defines the ways in which you may use a computer program [two words]
- GUI-based operating system developed by Microsoft Corporation [two words]
|
© 2013
PuzzleFast.com, Noncommercial Use Only
R | Q | N | W | Q | J | T | G | M | I | C | R | O | S | O | F | T | W | I | N | D | O | W | S | C | M |
C | F | A | M | H | V | R | Y | U | W | E | K | Y | C | X | L | J | U | N | Z | I | P | P | E | D | M |
O | M | S | L | T | K | X | Q | Y | I | T | E | X | J | V | T | F | R | O | Y | E | R | S | W | C | A |
M | A | A | P | U | B | L | I | C | D | O | M | A | I | N | F | D | Y | E | R | T | N | U | M | W | E |
M | S | T | P | P | M | L | W | Q | A | R | K | Q | B | H | H | C | Y | A | T | E | N | D | J | S | N |
A | S | D | D | I | P | I | F | T | A | K | G | L | N | N | G | B | W | V | C | R | E | A | K | A | D |
N | M | J | K | M | L | N | C | C | Y | E | Z | S | H | C | Y | E | O | I | R | P | O | U | D | I | U |
D | A | Y | E | Q | A | U | S | O | V | Y | L | E | S | E | E | S | L | T | P | E | J | I | S | O | S |
L | I | K | R | N | U | X | E | M | C | L | Y | U | K | R | M | E | P | I | M | E | I | U | P | B | E |
I | L | A | N | K | E | F | R | M | S | O | S | A | F | X | R | L | Z | O | I | O | N | N | B | K | R |
N | I | P | E | M | N | D | V | E | J | G | B | V | H | A | A | G | W | Q | O | K | S | I | U | Y | Z |
E | N | J | L | D | C | K | I | R | C | G | I | N | W | I | F | M | A | O | I | F | Z | X | F | Q | M |
G | G | I | O | E | S | W | C | C | O | E | Y | T | C | D | A | A | T | H | R | K | E | E | F | E | V |
S | G | U | I | U | H | K | E | I | S | R | F | O | G | L | C | L | L | P | I | M | C | D | E | F | Y |
B | S | Z | R | R | F | T | P | A | Y | O | S | B | A | H | T | W | O | K | V | A | E | T | R | U | U |
U | M | I | S | O | W | Z | A | L | S | R | C | Q | G | Y | I | A | V | P | F | S | N | M | A | W | O |
H | V | R | F | W | G | G | C | M | S | H | A | R | E | W | A | R | E | R | R | L | K | A | K | W | P |
S | S | I | U | F | O | M | K | X | H | A | C | K | E | R | Z | E | E | O | L | I | H | C | H | H | E |
P | A | Y | L | O | A | D | K | X | U | O | F | O | T | M | H | T | H | C | E | P | A | O | I | C | N |
W | M | O | E | K | I | C | B | U | W | B | L | L | R | P | N | N | E | J | U | V | P | S | G | C | S |
O | Q | Z | L | E | E | W | E | Z | P | P | F | F | P | I | A | E | Y | K | K | P | H | Y | E | F | O |
K | B | L | E | N | D | E | D | G | Z | S | R | E | R | J | Y | T | C | G | F | U | Z | D | E | Z | U |
W | I | T | M | K | F | O | O | X | K | U | Z | E | O | V | B | A | C | K | D | O | O | R | A | G | R |
G | U | C | O | P | Y | R | I | G | H | T | S | R | L | V | B | X | T | H | B | B | S | M | P | L | C |
L | A | N | T | I | V | I | R | U | S | U | T | J | N | A | S | I | G | N | A | T | U | R | E | E | E |
D | E | N | I | A | L | O | F | S | E | R | V | I | C | E | I | C | D | L | O | P | B | V | T | R | P |
- BOT
- GUI
- UNIX
- WORM
- LINUX
- MACOS
- PATCH
- RETRO
- VIRUS
- BACKUP
- BUFFER
- HACKER
- KERNEL
| - SOCIAL
- ZIPPED
- BLENDED
- ENDUSER
- MALWARE
- PAYLOAD
- SPOOFED
- BACKDOOR
- FREEWARE
- UNZIPPED
- ANTIVIRUS
- COPYRIGHT
- KEYLOGGER
| - SHAREWARE
- SIGNATURE
- COMMERCIAL
- OPENSOURCE
- COMMANDLINE
- MASSMAILING
- SERVICEPACK
- TROJANHORSE
- PUBLICDOMAIN
- USERINTERFACE
- DENIALOFSERVICE
- SOFTWARELICENSE
- MICROSOFTWINDOWS
|
© 2013
PuzzleFast.com, Noncommercial Use Only