111.
What is the name of an application program that gathers user information and sends it to someone through the Internet?

113.
HTML viruses infect:

114.
Software programs that close potential security breaches in an operating system are known as:

115.
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

116.
__________ is the measurement of things such as fingerprints and retinal scans used for security access.

117.
What is the most common tool used to restrict access to a computer system?

118.
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

119.
The scrambling of code is known as:

120.
If you want to secure a message, use a(n):