A. set of rules B. error in a program C. unwanted advertisements on a web browser D. someone who accesses a system without permission E. a security violation F. path of a program giving undesired access G. record of who has used a computer and what they've used it for H. code to fix errors in a program
C pop-up
B bug
E security beach
G audit log
F backdoor
H patch
A protocol
D intruder