CAT theory

1234567891011121314151617
Across
  1. 2. Input The process of using a person's physical characteristics for authentication.
  2. 3. A type of malware that appears to be a legitimate program but hides malicious code.
  3. 5. A type of network that connects devices within a person's immediate workspace.
  4. 12. The process of making a system usable for people with disabilities.
  5. 13. A utility program that rearranges fragmented files on a storage device.
  6. 15. The act of sending data from a local computer to a server.
  7. 16. A technology that allows devices to communicate when they are a few centimeters apart.
  8. 17. of Things (IOT) The concept of a network of physical objects embedded with sensors and software.
Down
  1. 1. The act of receiving data from a server to a local computer.
  2. 4. Computer A type of computer that is a single-user system designed for personal or home use.
  3. 6. Drive (SSD) A type of storage device that uses flash memory and has no moving parts.
  4. 7. Source Software A form of software licensing that allows the software to be freely used, modified, and shared.
  5. 8. A type of cyber-attack that hijacks your browser to redirect you to a fake website.
  6. 9. A network that covers a small geographical area, like a home or office.
  7. 10. Logging A program that tracks and records every keystroke made on a computer.
  8. 11. A system that uses sound waves to communicate over the internet.
  9. 13. Attack A type of cyber-attack where multiple compromised systems flood a target's network, causing it to crash.
  10. 14. Theft A computer crime that involves acquiring a person's personal information for fraudulent use.