1. | If your computer keeps rebooting itself, then it is likely that _______ ? | |
2. | A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a ? | |
3. | You can protect sensitive data from prying eyes using ______ ? | |
4. | A hacker contacts your phone or E-mails and attempts to acquire your password is called ? | |
5. | Abuse messaging systems to send unsolicited is ? | |
6. | A time bomb occurs during a particular ? | |
7. | ‘Trend Micro’ is a ? | |
8. | A program designed to destroy data on your compute which can travel to infect other computers, is called is ? | |
9. | Which virus spreads in application software ? | |
10. | The first computer virus is ? | |