This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Computer Crime

| See more in IT Security

Chapter 10 - G10 D&C

DuhaRafiq
Created Date 04.08.20
Last Updated 04.08.20
Viewed 2 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • A person who uses computers to gain unauthorized access to data.
  • Program that can make copies of its self in order to infect other computers
  • Infected disks, Flash memory, downloaded files or E-mail
  • The act of using a computer to take or alter electronic data
  • Distributed unsolicited e-mails to hundreds of different addresses, eg. Advertisements
  • Deceiving a system into thinking you are some one you are not
  • Is a computer program used to prevent, detect, and remove malware (viruses) from a computer
  • criminal activity that involves the use of computers or networks such as the internet
  • Help the data to be restored back to its original condition