11.
What is the name of an application program that gathers user information and sends it to someone through the Internet?

13.
HTML viruses infect:

14.
Software programs that close potential security breaches in an operating system are known as:

15.
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

16.
__________ is the measurement of things such as fingerprints and retinal scans used for security access.

17.
What is the most common tool used to restrict access to a computer system?

18.
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

19.
The scrambling of code is known as:

20.
If you want to secure a message, use a(n):