| 1. | ________ is a computer program that performed anauthorised processes on a computer network. |
| 2. | A true _____ cannot spread to anather computer without human assistance. |
| 3. | The contents of a trojan horse can be a virus or a _______. |
| 4. | Worm can spread copies of itself as a _______ program. |
| 5. | A _____ has advanced computer and network skills. |
| 6. | Worm operates through the _______. |
| 7. | Most dangerous virus ever created. |
| 8. | Computer ________ means protecting our computer system. |
| 9. | ______ could overite the Master Boot Record of the HDD. |
| 10. | Computer are also threatened by _______ disaster. Credit : Facebook Mai Aim |
Jadilah kamu seperti processor. Kecil di mata orang lain tapi besar perananmu untuk orang lain.
22 March 2013
Activity Form 4 Crossword : Computer Security
Labels:
Form 4,
ICT,
ICT_Exercise,
NoteResources
Subscribe to:
Post Comments (Atom)

No comments:
Post a Comment