CompSci

1234567891011121314151617181920
Across
  1. 3. Gathering info abt computer systems before it is attacked
  2. 4. Type of attack that uses a computer program to generate all combinations of characters until it finds the combination that matches the password
  3. 8. Illegal copying of software of data
  4. 10. Type of attack that comes from a network of distributed computer systems
  5. 11. Something to swap tasks in and out of the processor to appear that the computer is multitasking
  6. 13. Gives user special access
  7. 14. Gives user no restriction to the software
  8. 17. Credit must be given to author
  9. 19. Prevents malicious traffic from entering the network
  10. 20. Encrypts the IP address to hide it
Down
  1. 1. Devices not allowed to connect to network
  2. 2. Protects original work
  3. 5. Protects indication of commercial source
  4. 6. Protects ideas
  5. 7. Program that controls the operation of a specific type of device that is a part of the computer system
  6. 9. Allows the user to interact with the system by typing in specific commands
  7. 12. Type of attack that uses a list of passwords to check if the password that is being cracked matches a password in the list
  8. 15. Short of robot network, a network of computers under control of a single operator
  9. 16. Fooling biometric scanners
  10. 18. Language that is used to form queries to extract or manipulate information in a database