Documente Academic
Documente Profesional
Documente Cultură
1S E U I T 2F
C R Y
I I
G
R
3P O 4T E C
N R T S E
H W
A
5T O J A N 6
T R A E Y
U 7V L
E
I A 8w L
R
9E R p I O
N C Y T N
U
S R
10M A O U
S L A C I S
ACROSS
1. In the computer industry, it refers to techniques for ensuring that data stored in a computer cannot be
read or compromised by any individuals without authorization.
10. It is a software system that is intended to cause undesired effects, or damage to a system.
= TO BE CONTINUED BELOW =
DOWN
1. It is used to authenticate the identity of the sender of a message to ensure that the original content of the
message that has been sent is unchanged.
7. A program or piece of code that is loaded onto your computer without your knowledge and runs against
your wishes.
8. A program that replicates itself over a computer network and usually performs malicious actions, such as
using up the computer’s resources and possible shutting the system down.
INSTRUCTION
Please fill up the answers into the survey given in this link:
http://sinwebs302:1000/DYO_HSE/Lists/Internet%20Safety%20Quiz%20by%20DYO%20%20Day
%205/overview.aspx