Puzzle 20130617886680
a word search puzzle by
PuzzleFast Instant Puzzle Maker
Puzzle URL
https://www.puzzlefast.com/en/puzzles/20130617886680
To embed this puzzle on your website, paste the markup below into your HTML. Change the width and height values as desired.
Plain Puzzle
Plain Puzzle Without Solution Link
Hide This
1:00
en
WO
39
antivirus : ______ software is a type of utility software that can look for and eradicate viruses, Trojan horses, bots, and worms.
backdoor : A ______ allows remote hackers to download and execute files on your computer, upload a list of other infected computers, and use your computer as a relay station for breaking into other computers.
backup : a copy of one or more files that has been made in case the original files become damaged
blended : Virus experts use the term ______ threat to describe threats that combine more than one type of malicious program.
bot : Any software that can automate a task or autonomously execute a task when commanded to do so is called an intelligent agent or ______ since the software’s behavior mimics a robot. They have become the biggest threat because they can form ___nets that can launch widescale Denial of Service attacks and distribute mountains of spam.
buffer : technical jargon for a region of memory that holds data waiting to be transferred from one device to another
command line : this type of interface requires users to type memorized commands to run programs and accomplished tasks [two words]
commercial : ______ software is typically sold in computer stores or at Web sites.
copyright : a form of legal protection that grants the author of an original “work” an exclusive right to copy, distribute, sell, and modify that work
Denial of Service : A ______ ___ ______ attack is designed to generate a lot of activity on a network by flooding its servers with useless traffic that is enough to overwhelm the server’s processing capability and essentially bring all communications to a halt.
end user : this license agreement is displayed on-screen when you first install software [two words]
freeware : ______ is copyrighted software that is available for free.
GUI : this type of interface provides a way to point and click a mouse to select menu options and manipulate graphical objects displayed on the screen [acronym]
hacker : a person who uses a computer to gain unauthorized access to data, steal information, distribute viruses, or crash systems
kernel : the core part of the operating system
keylogger : Trojan horses are notorious for stealing passwords using a ______, which is a type of program that records your keystrokes.
Linux : a Unix-like computer operating system assembled under the model of free and open source software development and distribution
Mac OS : GUI-based operating system developed by Apple, Inc. [two words]
malware : refers to any program or set of program instructions designed to surreptitiously entre a computer and disrupt its normal operations
mass mailing : A ______ ______ worm spreads by sending itself to every address in the address book of an infected computer. It often includes an attachment that contains the worm.
Microsoft Windows : GUI-based operating system developed by Microsoft Corporation [two words]
open source : ______ ______software makes the uncompiled program instructions (source code) available to programmers who want to modify and improve the software.
patch : A software ______ is a small section of program code that replaces part of the software you currently have installed.
payload : In addition to replicating itself, a virus might deliver a ______, which could be as harmless as displaying an annoying message or as devastating as corrupting the data on your computer’s hard disk.
public domain : ______ ______ software is available for public use without restriction except that it cannot be copyrighted.
retro : Malicious programs called ______ viruses are designed to attack antivirus software by deleting the files that contain virus descriptions or corrupting the main executable virus-scanning program.
service pack : a set of patches that correct problems and address security vulnerabilities [two words]
shareware : ______ is copyrighted software marketed under a “try before you buy” policy (free trial).
signature : A virus ______ is a section of program code that can be used to identify a known malicious program.
social : Hackers have become proficient at using “______ engineering” techniques to make e-mail messages and their attachments seem legitimate.
software license : a legal contract that defines the ways in which you may use a computer program [two words]
spoofed : Mass-mailing worms are difficult to track because the “From” line of the infected message contains a ______ address of a randomly selected person with a valid address from the address book rather than the address of the computer that actually sent the mail.
Trojan horse : a computer program that seems to perform one function while actually doing something else [two words]
Unix : a multitasking, multi-user computer operating system originally developed in assembly language in 1969 by a group of AT&T employees at Bell Labs
unzipped : refers to files that have been uncompressed or reconstituted into the original collection of files
user interface : the combination of hardware and software that helps people and computers communicate with each other [two words]
virus : A computer ______ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.
worm : Unlike a virus, which is designed to spread from file to file, a ______ is designed to spread from computer to computer. Most of them take advantage of communications networks (mainly the Internet).
zipped : refers to one or more files that have been compressed to decrease size and reduce download time
R | Q | N | W | Q | J | T | G | M | I | C | R | O | S | O | F | T | W | I | N | D | O | W | S | C | M |
C | F | A | M | H | V | R | Y | U | W | E | K | Y | C | X | L | J | U | N | Z | I | P | P | E | D | M |
O | M | S | L | T | K | X | Q | Y | I | T | E | X | J | V | T | F | R | O | Y | E | R | S | W | C | A |
M | A | A | P | U | B | L | I | C | D | O | M | A | I | N | F | D | Y | E | R | T | N | U | M | W | E |
M | S | T | P | P | M | L | W | Q | A | R | K | Q | B | H | H | C | Y | A | T | E | N | D | J | S | N |
A | S | D | D | I | P | I | F | T | A | K | G | L | N | N | G | B | W | V | C | R | E | A | K | A | D |
N | M | J | K | M | L | N | C | C | Y | E | Z | S | H | C | Y | E | O | I | R | P | O | U | D | I | U |
D | A | Y | E | Q | A | U | S | O | V | Y | L | E | S | E | E | S | L | T | P | E | J | I | S | O | S |
L | I | K | R | N | U | X | E | M | C | L | Y | U | K | R | M | E | P | I | M | E | I | U | P | B | E |
I | L | A | N | K | E | F | R | M | S | O | S | A | F | X | R | L | Z | O | I | O | N | N | B | K | R |
N | I | P | E | M | N | D | V | E | J | G | B | V | H | A | A | G | W | Q | O | K | S | I | U | Y | Z |
E | N | J | L | D | C | K | I | R | C | G | I | N | W | I | F | M | A | O | I | F | Z | X | F | Q | M |
G | G | I | O | E | S | W | C | C | O | E | Y | T | C | D | A | A | T | H | R | K | E | E | F | E | V |
S | G | U | I | U | H | K | E | I | S | R | F | O | G | L | C | L | L | P | I | M | C | D | E | F | Y |
B | S | Z | R | R | F | T | P | A | Y | O | S | B | A | H | T | W | O | K | V | A | E | T | R | U | U |
U | M | I | S | O | W | Z | A | L | S | R | C | Q | G | Y | I | A | V | P | F | S | N | M | A | W | O |
H | V | R | F | W | G | G | C | M | S | H | A | R | E | W | A | R | E | R | R | L | K | A | K | W | P |
S | S | I | U | F | O | M | K | X | H | A | C | K | E | R | Z | E | E | O | L | I | H | C | H | H | E |
P | A | Y | L | O | A | D | K | X | U | O | F | O | T | M | H | T | H | C | E | P | A | O | I | C | N |
W | M | O | E | K | I | C | B | U | W | B | L | L | R | P | N | N | E | J | U | V | P | S | G | C | S |
O | Q | Z | L | E | E | W | E | Z | P | P | F | F | P | I | A | E | Y | K | K | P | H | Y | E | F | O |
K | B | L | E | N | D | E | D | G | Z | S | R | E | R | J | Y | T | C | G | F | U | Z | D | E | Z | U |
W | I | T | M | K | F | O | O | X | K | U | Z | E | O | V | B | A | C | K | D | O | O | R | A | G | R |
G | U | C | O | P | Y | R | I | G | H | T | S | R | L | V | B | X | T | H | B | B | S | M | P | L | C |
L | A | N | T | I | V | I | R | U | S | U | T | J | N | A | S | I | G | N | A | T | U | R | E | E | E |
D | E | N | I | A | L | O | F | S | E | R | V | I | C | E | I | C | D | L | O | P | B | V | T | R | P |
- Any software that can automate a task or autonomously execute a task when commanded to do so is called an intelligent agent or ______ since the software’s behavior mimics a robot. They have become the biggest threat because they can form ___nets that can launch widescale Denial of Service attacks and distribute mountains of spam.
- this type of interface provides a way to point and click a mouse to select menu options and manipulate graphical objects displayed on the screen [acronym]
- a multitasking, multi-user computer operating system originally developed in assembly language in 1969 by a group of AT&T employees at Bell Labs
- Unlike a virus, which is designed to spread from file to file, a ______ is designed to spread from computer to computer. Most of them take advantage of communications networks (mainly the Internet).
- a Unix-like computer operating system assembled under the model of free and open source software development and distribution
- GUI-based operating system developed by Apple, Inc. [two words]
- A software ______ is a small section of program code that replaces part of the software you currently have installed.
- Malicious programs called ______ viruses are designed to attack antivirus software by deleting the files that contain virus descriptions or corrupting the main executable virus-scanning program.
- A computer ______ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.
- a copy of one or more files that has been made in case the original files become damaged
- technical jargon for a region of memory that holds data waiting to be transferred from one device to another
- a person who uses a computer to gain unauthorized access to data, steal information, distribute viruses, or crash systems
- the core part of the operating system
| - Hackers have become proficient at using “______ engineering” techniques to make e-mail messages and their attachments seem legitimate.
- refers to one or more files that have been compressed to decrease size and reduce download time
- Virus experts use the term ______ threat to describe threats that combine more than one type of malicious program.
- this license agreement is displayed on-screen when you first install software [two words]
- refers to any program or set of program instructions designed to surreptitiously entre a computer and disrupt its normal operations
- In addition to replicating itself, a virus might deliver a ______, which could be as harmless as displaying an annoying message or as devastating as corrupting the data on your computer’s hard disk.
- Mass-mailing worms are difficult to track because the “From” line of the infected message contains a ______ address of a randomly selected person with a valid address from the address book rather than the address of the computer that actually sent the mail.
- A ______ allows remote hackers to download and execute files on your computer, upload a list of other infected computers, and use your computer as a relay station for breaking into other computers.
- ______ is copyrighted software that is available for free.
- refers to files that have been uncompressed or reconstituted into the original collection of files
- ______ software is a type of utility software that can look for and eradicate viruses, Trojan horses, bots, and worms.
- a form of legal protection that grants the author of an original “work” an exclusive right to copy, distribute, sell, and modify that work
- Trojan horses are notorious for stealing passwords using a ______, which is a type of program that records your keystrokes.
| - ______ is copyrighted software marketed under a “try before you buy” policy (free trial).
- A virus ______ is a section of program code that can be used to identify a known malicious program.
- ______ software is typically sold in computer stores or at Web sites.
- ______ ______software makes the uncompiled program instructions (source code) available to programmers who want to modify and improve the software.
- this type of interface requires users to type memorized commands to run programs and accomplished tasks [two words]
- A ______ ______ worm spreads by sending itself to every address in the address book of an infected computer. It often includes an attachment that contains the worm.
- a set of patches that correct problems and address security vulnerabilities [two words]
- a computer program that seems to perform one function while actually doing something else [two words]
- ______ ______ software is available for public use without restriction except that it cannot be copyrighted.
- the combination of hardware and software that helps people and computers communicate with each other [two words]
- A ______ ___ ______ attack is designed to generate a lot of activity on a network by flooding its servers with useless traffic that is enough to overwhelm the server’s processing capability and essentially bring all communications to a halt.
- a legal contract that defines the ways in which you may use a computer program [two words]
- GUI-based operating system developed by Microsoft Corporation [two words]
|
© 2013
PuzzleFast.com, Noncommercial Use Only
R | Q | N | W | Q | J | T | G | M | I | C | R | O | S | O | F | T | W | I | N | D | O | W | S | C | M |
C | F | A | M | H | V | R | Y | U | W | E | K | Y | C | X | L | J | U | N | Z | I | P | P | E | D | M |
O | M | S | L | T | K | X | Q | Y | I | T | E | X | J | V | T | F | R | O | Y | E | R | S | W | C | A |
M | A | A | P | U | B | L | I | C | D | O | M | A | I | N | F | D | Y | E | R | T | N | U | M | W | E |
M | S | T | P | P | M | L | W | Q | A | R | K | Q | B | H | H | C | Y | A | T | E | N | D | J | S | N |
A | S | D | D | I | P | I | F | T | A | K | G | L | N | N | G | B | W | V | C | R | E | A | K | A | D |
N | M | J | K | M | L | N | C | C | Y | E | Z | S | H | C | Y | E | O | I | R | P | O | U | D | I | U |
D | A | Y | E | Q | A | U | S | O | V | Y | L | E | S | E | E | S | L | T | P | E | J | I | S | O | S |
L | I | K | R | N | U | X | E | M | C | L | Y | U | K | R | M | E | P | I | M | E | I | U | P | B | E |
I | L | A | N | K | E | F | R | M | S | O | S | A | F | X | R | L | Z | O | I | O | N | N | B | K | R |
N | I | P | E | M | N | D | V | E | J | G | B | V | H | A | A | G | W | Q | O | K | S | I | U | Y | Z |
E | N | J | L | D | C | K | I | R | C | G | I | N | W | I | F | M | A | O | I | F | Z | X | F | Q | M |
G | G | I | O | E | S | W | C | C | O | E | Y | T | C | D | A | A | T | H | R | K | E | E | F | E | V |
S | G | U | I | U | H | K | E | I | S | R | F | O | G | L | C | L | L | P | I | M | C | D | E | F | Y |
B | S | Z | R | R | F | T | P | A | Y | O | S | B | A | H | T | W | O | K | V | A | E | T | R | U | U |
U | M | I | S | O | W | Z | A | L | S | R | C | Q | G | Y | I | A | V | P | F | S | N | M | A | W | O |
H | V | R | F | W | G | G | C | M | S | H | A | R | E | W | A | R | E | R | R | L | K | A | K | W | P |
S | S | I | U | F | O | M | K | X | H | A | C | K | E | R | Z | E | E | O | L | I | H | C | H | H | E |
P | A | Y | L | O | A | D | K | X | U | O | F | O | T | M | H | T | H | C | E | P | A | O | I | C | N |
W | M | O | E | K | I | C | B | U | W | B | L | L | R | P | N | N | E | J | U | V | P | S | G | C | S |
O | Q | Z | L | E | E | W | E | Z | P | P | F | F | P | I | A | E | Y | K | K | P | H | Y | E | F | O |
K | B | L | E | N | D | E | D | G | Z | S | R | E | R | J | Y | T | C | G | F | U | Z | D | E | Z | U |
W | I | T | M | K | F | O | O | X | K | U | Z | E | O | V | B | A | C | K | D | O | O | R | A | G | R |
G | U | C | O | P | Y | R | I | G | H | T | S | R | L | V | B | X | T | H | B | B | S | M | P | L | C |
L | A | N | T | I | V | I | R | U | S | U | T | J | N | A | S | I | G | N | A | T | U | R | E | E | E |
D | E | N | I | A | L | O | F | S | E | R | V | I | C | E | I | C | D | L | O | P | B | V | T | R | P |
- BOT
- GUI
- UNIX
- WORM
- LINUX
- MACOS
- PATCH
- RETRO
- VIRUS
- BACKUP
- BUFFER
- HACKER
- KERNEL
| - SOCIAL
- ZIPPED
- BLENDED
- ENDUSER
- MALWARE
- PAYLOAD
- SPOOFED
- BACKDOOR
- FREEWARE
- UNZIPPED
- ANTIVIRUS
- COPYRIGHT
- KEYLOGGER
| - SHAREWARE
- SIGNATURE
- COMMERCIAL
- OPENSOURCE
- COMMANDLINE
- MASSMAILING
- SERVICEPACK
- TROJANHORSE
- PUBLICDOMAIN
- USERINTERFACE
- DENIALOFSERVICE
- SOFTWARELICENSE
- MICROSOFTWINDOWS
|
© 2013
PuzzleFast.com, Noncommercial Use Only