MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.Intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.databases
q.cloud computing
r.botnet
-Malicious software programs such as worms,viruses,and Trojan horses designed to infect computer systems are known as __________.