SlideShare a Scribd company logo
Across Down 1. Duplicate that can be used if the original is lost, damaged, or 2. Private
combination of characters associated with the user destroyed name 4. Unauthorized and illegal
duplication of copyrighted software 3. Demands payment to stop an attack on an organization's
5. Useful to record, save, and execute keystrokes and instructions technology infrastructure
repeatedly 5. Programs that act without a user's knowledge and alter 6. Program that performs a
repetitive task on a network computer operations 7. Displays an online ads in a banner or pop-up
window on 9. Private combination of words associated with a user name webpages 10.
Compromised computers connected to a network and used to 8. Program that copies itself
repeatedly attack other networks 12. Consists of images displayed in motion 11. Small text file
that a web server stores on your computer 13. Technique used to make network or Internet
transmissions 14. Someone who accesses a computer or network illegally appear legitimate 16.
Compromised computer or device 15. The encrypted (scrambled) data in the encryption process
17. Program that hides in a computer and allows someone to take control of it 18. Destructive
event or prank 19. Online or Internet-based illegal acts 20. The unencrypted, readable data in the
encryption process

More Related Content

Similar to Across Down 1- Duplicate that can be used if the original is lost- dam.pdf

Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
 
Code protection
Code protectionCode protection
Code protection
whitecryption
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crimeangbeelee
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
JAYANTHKUMARTM
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
Internet Security
Internet SecurityInternet Security
Internet Security
Parv Poddar
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Computer Crime and Safety Measure
Computer Crime and Safety MeasureComputer Crime and Safety Measure
Computer Crime and Safety Measure
Purushottam Dahal
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 eso
PILARSUREZMENESES
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT Systems
Dam Frank
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
Application security
Application securityApplication security
Application security
Hagar Alaa el-din
 
why security is needed
why security is neededwhy security is needed
why security is neededsourov_das
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 

Similar to Across Down 1- Duplicate that can be used if the original is lost- dam.pdf (20)

Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Code protection
Code protectionCode protection
Code protection
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Hamza
HamzaHamza
Hamza
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer security
Computer securityComputer security
Computer security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Computer Crime and Safety Measure
Computer Crime and Safety MeasureComputer Crime and Safety Measure
Computer Crime and Safety Measure
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 eso
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT Systems
 
Computer
ComputerComputer
Computer
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Application security
Application securityApplication security
Application security
 
why security is needed
why security is neededwhy security is needed
why security is needed
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 

More from yrajjoshi

Aiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdf
Aiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdfAiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdf
Aiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdf
yrajjoshi
 
Albinism is an autosomal recessive trait- A man and woman (-the couple.pdf
Albinism is an autosomal recessive trait- A man and woman (-the couple.pdfAlbinism is an autosomal recessive trait- A man and woman (-the couple.pdf
Albinism is an autosomal recessive trait- A man and woman (-the couple.pdf
yrajjoshi
 
Alan and Sara Winthrop are a married couple who file a joint income ta.pdf
Alan and Sara Winthrop are a married couple who file a joint income ta.pdfAlan and Sara Winthrop are a married couple who file a joint income ta.pdf
Alan and Sara Winthrop are a married couple who file a joint income ta.pdf
yrajjoshi
 
Aim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdf
Aim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdfAim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdf
Aim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdf
yrajjoshi
 
Air Quality and Fire Seasons California has experienced in the last 5.pdf
Air Quality and Fire Seasons California has experienced in the last 5.pdfAir Quality and Fire Seasons California has experienced in the last 5.pdf
Air Quality and Fire Seasons California has experienced in the last 5.pdf
yrajjoshi
 
Air masses are large masses of air with and one for the temperature- D.pdf
Air masses are large masses of air with and one for the temperature- D.pdfAir masses are large masses of air with and one for the temperature- D.pdf
Air masses are large masses of air with and one for the temperature- D.pdf
yrajjoshi
 
Air Masses An air mass is a large mass of air that has similar charact.pdf
Air Masses An air mass is a large mass of air that has similar charact.pdfAir Masses An air mass is a large mass of air that has similar charact.pdf
Air Masses An air mass is a large mass of air that has similar charact.pdf
yrajjoshi
 
AHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdf
AHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdfAHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdf
AHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdf
yrajjoshi
 
Age discrimination- The following table presents the numbers of employ.pdf
Age discrimination- The following table presents the numbers of employ.pdfAge discrimination- The following table presents the numbers of employ.pdf
Age discrimination- The following table presents the numbers of employ.pdf
yrajjoshi
 
After two hyphae have determined they are compatible what is the next.pdf
After two hyphae have determined they are compatible what is the next.pdfAfter two hyphae have determined they are compatible what is the next.pdf
After two hyphae have determined they are compatible what is the next.pdf
yrajjoshi
 
After studying all night for a final exam- a bleary-eyed student rando.pdf
After studying all night for a final exam- a bleary-eyed student rando.pdfAfter studying all night for a final exam- a bleary-eyed student rando.pdf
After studying all night for a final exam- a bleary-eyed student rando.pdf
yrajjoshi
 
Additional informations 1- The aunket price of Concord's common stock.pdf
Additional informations 1- The aunket price of Concord's common stock.pdfAdditional informations 1- The aunket price of Concord's common stock.pdf
Additional informations 1- The aunket price of Concord's common stock.pdf
yrajjoshi
 
Additional information- 1- The common and preferred shares and stock o.pdf
Additional information- 1- The common and preferred shares and stock o.pdfAdditional information- 1- The common and preferred shares and stock o.pdf
Additional information- 1- The common and preferred shares and stock o.pdf
yrajjoshi
 
Adipose tissue is found in the dermis the hypodermis tendons and ligam.pdf
Adipose tissue is found in the dermis the hypodermis tendons and ligam.pdfAdipose tissue is found in the dermis the hypodermis tendons and ligam.pdf
Adipose tissue is found in the dermis the hypodermis tendons and ligam.pdf
yrajjoshi
 
Additional Information on Dec-31- 1- Accrued salaries at year-end are.pdf
Additional Information on Dec-31- 1- Accrued salaries at year-end are.pdfAdditional Information on Dec-31- 1- Accrued salaries at year-end are.pdf
Additional Information on Dec-31- 1- Accrued salaries at year-end are.pdf
yrajjoshi
 
Add a method removeOccurence(int e) that removes all occurrences of el.pdf
Add a method removeOccurence(int e) that removes all occurrences of el.pdfAdd a method removeOccurence(int e) that removes all occurrences of el.pdf
Add a method removeOccurence(int e) that removes all occurrences of el.pdf
yrajjoshi
 
Activity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdf
Activity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdfActivity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdf
Activity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdf
yrajjoshi
 
Adapt the following menu for a person of the Orthodox Jewish faith-.pdf
Adapt the following menu for a person of the Orthodox Jewish faith-.pdfAdapt the following menu for a person of the Orthodox Jewish faith-.pdf
Adapt the following menu for a person of the Orthodox Jewish faith-.pdf
yrajjoshi
 
Activitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdf
Activitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdfActivitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdf
Activitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdf
yrajjoshi
 
Activity Description ImmediatePredecessorOptimistic Most Probable Pess.pdf
Activity Description ImmediatePredecessorOptimistic Most Probable Pess.pdfActivity Description ImmediatePredecessorOptimistic Most Probable Pess.pdf
Activity Description ImmediatePredecessorOptimistic Most Probable Pess.pdf
yrajjoshi
 

More from yrajjoshi (20)

Aiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdf
Aiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdfAiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdf
Aiat 10AA- Whap Tot- B I-M1 B -8+A- Decanber 31 otrice supgies remwivi.pdf
 
Albinism is an autosomal recessive trait- A man and woman (-the couple.pdf
Albinism is an autosomal recessive trait- A man and woman (-the couple.pdfAlbinism is an autosomal recessive trait- A man and woman (-the couple.pdf
Albinism is an autosomal recessive trait- A man and woman (-the couple.pdf
 
Alan and Sara Winthrop are a married couple who file a joint income ta.pdf
Alan and Sara Winthrop are a married couple who file a joint income ta.pdfAlan and Sara Winthrop are a married couple who file a joint income ta.pdf
Alan and Sara Winthrop are a married couple who file a joint income ta.pdf
 
Aim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdf
Aim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdfAim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdf
Aim- Configure FTP server Prerequisite- configure a VM in any virtuali.pdf
 
Air Quality and Fire Seasons California has experienced in the last 5.pdf
Air Quality and Fire Seasons California has experienced in the last 5.pdfAir Quality and Fire Seasons California has experienced in the last 5.pdf
Air Quality and Fire Seasons California has experienced in the last 5.pdf
 
Air masses are large masses of air with and one for the temperature- D.pdf
Air masses are large masses of air with and one for the temperature- D.pdfAir masses are large masses of air with and one for the temperature- D.pdf
Air masses are large masses of air with and one for the temperature- D.pdf
 
Air Masses An air mass is a large mass of air that has similar charact.pdf
Air Masses An air mass is a large mass of air that has similar charact.pdfAir Masses An air mass is a large mass of air that has similar charact.pdf
Air Masses An air mass is a large mass of air that has similar charact.pdf
 
AHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdf
AHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdfAHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdf
AHIMA HIM entry-level curiculum competescies- I-1 and I-2 cough and is.pdf
 
Age discrimination- The following table presents the numbers of employ.pdf
Age discrimination- The following table presents the numbers of employ.pdfAge discrimination- The following table presents the numbers of employ.pdf
Age discrimination- The following table presents the numbers of employ.pdf
 
After two hyphae have determined they are compatible what is the next.pdf
After two hyphae have determined they are compatible what is the next.pdfAfter two hyphae have determined they are compatible what is the next.pdf
After two hyphae have determined they are compatible what is the next.pdf
 
After studying all night for a final exam- a bleary-eyed student rando.pdf
After studying all night for a final exam- a bleary-eyed student rando.pdfAfter studying all night for a final exam- a bleary-eyed student rando.pdf
After studying all night for a final exam- a bleary-eyed student rando.pdf
 
Additional informations 1- The aunket price of Concord's common stock.pdf
Additional informations 1- The aunket price of Concord's common stock.pdfAdditional informations 1- The aunket price of Concord's common stock.pdf
Additional informations 1- The aunket price of Concord's common stock.pdf
 
Additional information- 1- The common and preferred shares and stock o.pdf
Additional information- 1- The common and preferred shares and stock o.pdfAdditional information- 1- The common and preferred shares and stock o.pdf
Additional information- 1- The common and preferred shares and stock o.pdf
 
Adipose tissue is found in the dermis the hypodermis tendons and ligam.pdf
Adipose tissue is found in the dermis the hypodermis tendons and ligam.pdfAdipose tissue is found in the dermis the hypodermis tendons and ligam.pdf
Adipose tissue is found in the dermis the hypodermis tendons and ligam.pdf
 
Additional Information on Dec-31- 1- Accrued salaries at year-end are.pdf
Additional Information on Dec-31- 1- Accrued salaries at year-end are.pdfAdditional Information on Dec-31- 1- Accrued salaries at year-end are.pdf
Additional Information on Dec-31- 1- Accrued salaries at year-end are.pdf
 
Add a method removeOccurence(int e) that removes all occurrences of el.pdf
Add a method removeOccurence(int e) that removes all occurrences of el.pdfAdd a method removeOccurence(int e) that removes all occurrences of el.pdf
Add a method removeOccurence(int e) that removes all occurrences of el.pdf
 
Activity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdf
Activity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdfActivity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdf
Activity-beste Costing for a Serves Company five-stars Insurasce Cempa.pdf
 
Adapt the following menu for a person of the Orthodox Jewish faith-.pdf
Adapt the following menu for a person of the Orthodox Jewish faith-.pdfAdapt the following menu for a person of the Orthodox Jewish faith-.pdf
Adapt the following menu for a person of the Orthodox Jewish faith-.pdf
 
Activitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdf
Activitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdfActivitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdf
Activitye Complete the Stery ef Bleces Flovi throughthe Hotart (4) cha.pdf
 
Activity Description ImmediatePredecessorOptimistic Most Probable Pess.pdf
Activity Description ImmediatePredecessorOptimistic Most Probable Pess.pdfActivity Description ImmediatePredecessorOptimistic Most Probable Pess.pdf
Activity Description ImmediatePredecessorOptimistic Most Probable Pess.pdf
 

Recently uploaded

MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Across Down 1- Duplicate that can be used if the original is lost- dam.pdf

  • 1. Across Down 1. Duplicate that can be used if the original is lost, damaged, or 2. Private combination of characters associated with the user destroyed name 4. Unauthorized and illegal duplication of copyrighted software 3. Demands payment to stop an attack on an organization's 5. Useful to record, save, and execute keystrokes and instructions technology infrastructure repeatedly 5. Programs that act without a user's knowledge and alter 6. Program that performs a repetitive task on a network computer operations 7. Displays an online ads in a banner or pop-up window on 9. Private combination of words associated with a user name webpages 10. Compromised computers connected to a network and used to 8. Program that copies itself repeatedly attack other networks 12. Consists of images displayed in motion 11. Small text file that a web server stores on your computer 13. Technique used to make network or Internet transmissions 14. Someone who accesses a computer or network illegally appear legitimate 16. Compromised computer or device 15. The encrypted (scrambled) data in the encryption process 17. Program that hides in a computer and allows someone to take control of it 18. Destructive event or prank 19. Online or Internet-based illegal acts 20. The unencrypted, readable data in the encryption process