Créer une activité
Jouer Mots Roulette
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Y
Z
Starts with  
A
Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
Contains  
B
Habit of snubbing someone in favour of a mobile phone
Starts with  
C
Individual who breaks into a computer or a network system for malicious activities or own profit.
Starts with  
D
Process of decoding ciphered text to plain text, so it is readable by the user
Starts with  
E
Method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key
Starts with  
F
Hardware or Software to protect a computer against intruders
Starts with  
G
Action by a paedophile of preparing a child for a meeting, especially via an Internet chat room, with the intention of committing a sexual offence.
Starts with  
H
Skilled computer expert that uses their technical knowledge to overcome a problem
Contains  
I
Broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences
Contains  
J
Malicious computer program which misleads users of its true intent
Contains  
K
Text files that help a website keep track of your visits and activity
Starts with  
L
Feature in communication software such as social networking where the user can express that they enjoy or support certain content
Starts with  
M
Malicious software; any program or file that is harmful to a computer user
Starts with  
N
Good manners in online communication such as e-mail, forums, blogs, and social networking sites
Contains  
O
Server that acts as an intermediary between users and others servers, validating user requests.
Starts with  
P
Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
Starts with  
R
Set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
Starts with  
S
Sending, receiving, or forwarding sexually explicit messages, photographs, or images, primarily between mobile phones, of oneself to others
Contains  
T
Protocol over which data is sent between your browser and any website in a secure way (encrypted)
Contains  
U
Software vulnerability that can be exploited to gain unauthorized access or privileges on a computer system.
Starts with  
V
Piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Starts with  
W
Malware computer program that replicates itself in order to spread to other computers
Contains  
X
Message warning the recipients of a non-existent computer virus threat.
Contains  
Y
Malicious program for recording computer user keystrokes to steal passwords and other sensitive information.
Starts with  
Z
Computer that's been infected by a computer virus or compromised by a hacker.