Practica 02 Comunicacion Empresarial Computacion V

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Name: ___________________________________ Date: ______________

I.T Wordsearch
I I Y Z I Y I T J I H X R V F D Z S Y M R O G V
P Z N I Q Q S P Y E R A W Y P S S U D B U F Y F
R I X F Z K H E I F N C C S D I N E T E S I F T
A E S F O O E H S S D Y Y B S A E A C Q R I U V
X L Q J N R I B O U C I R B U M U R X U G R A R
C X H E M H M M N A R N D T E T R D P U R X O P
U N P J C S E A V X A I H T H R Y O R S H I A R
K D Q B M W C I T J W O V O E J C E W E H D T T
V T T R A J R A O I R Y R A O R S H X Z G H C Y
K K Y R M P Y R M I O I N O I T A T I O L P X E
O S E Z A D T K S M S N Y Q T D E U D V E C U M
O E V T T G L E G E E U Z Y W T Z C B J Y T Q P
B F A D W U D N D L C R T A M E E V N B U H Q M
E D R T K I I T J H L G R X M N J L E E A B A M
M I E H R H X I B J A E T B M R N R B C F L N B
O P V M S W N N S S A T A D V E A Y K I W F K A
R G P I I F R K C J V I O L A T E E T A M D O X
H G H T O R R W C W Q G X M T N R O R R J A X L
C P I C B O C U D B C Z U A R I U E L Q G V C F
L M R P W Z U S E R V I C E S A E Z L A Z V S S
C D W T H O U A E K T K Z P A S S W O R D W U J
D Y E C C O D I N G Y B A B Q L A P T O P S Z O
W N G H C Y B E R S E C U R I T Y S Y A E I P L
E R R F C O M P U T E R T C P T C I F R G C M J

Adware Authorised Chromebook Coding Computer


Crime Cyber Cyber attack Cyber Security Data
Data privacy Error Exploitation Figures Hacker ICT
Info Information Internet Laptop Malware Networks
Offence Password Phishing Phone Ransomeware Scam
Scammer Security Services Spyware Trojan Unauthorised
User Violate Viruses Worms

You might also like