1. Ugh! These slimy guys crawl in and then they crawl out: in computers, they're self-replicating programs that take up residence in active memory. What is it?
Answer
2. For Dracula's pal Renfield, this is a crunchy treat; in software, however, it's a coding error. What is it?
Answer
3. Long ago, in a very scary creature feature, hordes of these entities came from Mars, intent on murder and mayhem. In a less frightening incarnation, however, they've become better known for vacuuming and scrubbing floors. What is it?
Answer
4. This term describes a nasty massacre in a B movie; it's also a method of breaking data down into smaller chunks that can be viewed from different perspectives. What is it?
Answer
5. Sounds like a description of the sticky treats left at the bottom of your Halloween bag: in computers it's an interface that offers more to the user than simply text. What is it?
Answer
6. Does your costume include shades and a trench coat? You might be going as this type of programming that's installed on PCs to gather user information. What is it?
Answer
7. Not a highly popular Halloween treat, but it does okay as a company that makes computers and related products. What is it?
Answer
8. AKA zombie army (eek!), this term describes an unwary network of computers forwarding transmissions, unwittingly serving a nefarious master. What is it?
Answer
9. Presents itself as Jeckyll but acts like Hyde: This term describes a home-made wireless access point (hot spot) masquerading as a legitimate one to access data illicitly. What is it?
Answer
10. An argument among extraterrestrials? This term describes electromagnetic noise that can occur in a cable running alongside one or more other signal-carrying cables. What is it?
Answer
Still not scared? Take a deep breath, and enter The WhatIs Vault of Tech Terror.
This was first published in October 2005
Network Management Strategies for the CIO