Giving objects interactivity is known as ...
Managing and analyzing huge volumes of data is called ...
Computer security is a set of measures aimed at protecting
The set of actions aimed at protecting the computer and its content (information) is called ...
Programs that hijack other programs to use their rights or to modify their behavior...
Malicious Software...
Malicious program that pretends to overflow the system memory by reproducing itself is called ...
The software that is in charge of obtaining and memorizing the keystrokes made on a keyboard is called ...
Viruses housed in seemingly harmless elements are called...
Advertising included in programs that show it after installed...
A hacker is...
Redirect a domain name to a different machine, so that the user who enters a URL accesses the attacker's web page...
Computer expert dedicated to changing the way a commercial program works to pirate them.
Cookies are...
Company-initiated email chains to collect the email addresses of many users and then do mailings...
The CAPTCHA is...
MINIMIZE DAMAGE is...
Among the dangers that we face on the Internet, we can mention:
In some social networks it is not possible to delete the data that we have entered in them:
Pages with a secure cryptographic protocol have the ...
To use strong passwords is a good advice:
A type of malware installs without user permission...
E-mails that flood the network in order to advertise products, sometimes of dubious legality...
A correct advice is do not follow unknown people on the networks, and do not accept them either:
You can fill out forms that promise to give you a prize with personal data with total security: