Basic Puzzle
Across
- 3. engineering the term used for a broad range of malicious activities accomplished through human interactions
- 5. random-access memory
- 7. AUTHENTICATION a security process in which users provide two different authentication factors to verify themselves
- 9. hard disk drive
- 10. a device performing a Boolean logic operation on one or more binary inputs and then outputs a single binary output.
- 11. At its core, cache memory is a form of random access memory (RAM) that stores recently accessed data for quick retrieval
- 13. a miniature semiconductor that regulates or controls current or voltage flow in addition to amplifying and generating these electrical signals and acting as a switch or gate for them.
- 15. relating to or consisting of two things, in which everything is either one thing or the other
- 16. an acronym for American Standard Code for Information Interchange, is a character encoding standard for electronic communication.
- 17. drive allows you to use CDs, DVDs, and Blu-ray discs to listen to music or watch a movie.
- 18. a text encoding standard maintained by the Unicode Consortium designed to support the use of text in all of the world's writing systems that can be digitized.
- 19. a form of malware or hardware that keeps track of and records your keystrokes as you type.
Down
- 1. measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).
- 2. any computer program or software that is designed for nefarious purposes
- 4. an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable.
- 6. the main printed circuit board (PCB) in a computer
- 8. the program a computer's microprocessor uses to start the computer system after it is powered on.
- 9. sink a component used in electronic devices to dissipate heat and prevent overheating.
- 12. an attempt to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information or other important data in order to utilize or sell the stolen information.
- 14. is an expression of how much time it takes for a data packet to travel from one designated point to another.