1. | ________ is a computer program that performed anauthorised processes on a computer network. |
2. | A true _____ cannot spread to anather computer without human assistance. |
3. | The contents of a trojan horse can be a virus or a _______. |
4. | Worm can spread copies of itself as a _______ program. |
5. | A _____ has advanced computer and network skills. |
6. | Worm operates through the _______. |
7. | Most dangerous virus ever created. |
8. | Computer ________ means protecting our computer system. |
9. | ______ could overite the Master Boot Record of the HDD. |
10. | Computer are also threatened by _______ disaster. Credit : Facebook Mai Aim |
Jadilah kamu seperti processor. Kecil di mata orang lain tapi besar perananmu untuk orang lain.
22 March 2013
Activity Form 4 Crossword : Computer Security
Labels:
Form 4,
ICT,
ICT_Exercise,
NoteResources
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment