This website uses cookies to ensure you get the best experience on our website.
Privacy Policy
OK
Wisc-Online Arcade Logo
Toggle navigation
Learn
Games
Play Games
Build Games
Courses
Image Library
Search
User Profile
Sign Up
Sign In
Sign In
Sign Up
Computer Crime
|
See more in
IT Security
Chapter 10 - G10 D&C
By
Duha Rafiq
Created Date 04.08.20
Last Updated 04.08.20
Viewed 2 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
Download text-based alternate version
Tweet
Vote Up
Vote Down
0
Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!
But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.
Download the Chakalaka mobile app here:
You need to be logged in to use this feature.
Log In
or
Register
Topics of this game:
A person who uses computers to gain unauthorized access to data.
Program that can make copies of its self in order to infect other computers
Infected disks, Flash memory, downloaded files or E-mail
The act of using a computer to take or alter electronic data
Distributed unsolicited e-mails to hundreds of different addresses, eg. Advertisements
Deceiving a system into thinking you are some one you are not
Is a computer program used to prevent, detect, and remove malware (viruses) from a computer
criminal activity that involves the use of computers or networks such as the internet
Help the data to be restored back to its original condition
Questions
Feedback
Ask a Question
New Question
Cancel
|
Save
Start a new Discussion
New Discussion
Cancel
|
Save