HT3: Web Development
7 | |||||||||||||||||
3 | |||||||||||||||||
5 | |||||||||||||||||
4 | 9 | ||||||||||||||||
8 | |||||||||||||||||
1 | |||||||||||||||||
6 | |||||||||||||||||
2 |
Down | Across | ||||
---|---|---|---|---|---|
# | Clue Down | ✓ | # | Clue Across | ✓ |
5 | type of malware that encrypts your files without your permission and demands payment before you can access them again (10) | 1 | advantage of search technologies where people can share information and files with each other (13) | ||
7 | type of malware that tricks people into installing something harmful (6/5) | 2 | advantage of search technologies where time is saved by being able to find relevant information quickly (11) | ||
8 | type of malware that, when you run it, can spread to replicate itself and infect other computers (5) | 3 | using digital tools to intimidate, threaten or mock someone (13) | ||
9 | type of malware that can spread to replicate itself and infect other computers even without being run on your computer (4) | 4 | malicious software that is designed to do harm (7) | ||
6 | type of malware that secretly tracks user activity and shares personal information (7) |