Computer Science Assignment
Across
- 6. The illegal copying of software or data (e.g. movies) without regard to copyright
- 8. a form of malware that locks a computer or encrypts files, and therefore prevents a user from accessing their data
- 12. A user being sent to a fake website that the user believes is the real one.
- 13. Ensuring that resources are protected from unauthorised access
- 16. responsible for compressing and decompressing files you have saved on your device
- 18. A set of instructions, data or programs used to operate computers and execute specific tasks.
- 19. The computer's tangible components or delivery systems that store and run the written instructions provided by the software.
- 20. A type of surveillance technology used to monitor and record each keystroke on a specific computer.
Down
- 1. A piece of software that appears to be legitimate, to trick the user into executing it
- 2. Makes sure that data is unreadable if intercepted
- 3. Malicious form of self-replicating software that attaches itself to other programs or files
- 4. An attack in which the victim receives a message (by email, text or social media) disguised to look like it has come from a reputable source
- 5. software that looks at all of the data on a hard drive and reorganises it, so that related data is stored together.
- 7. Someone who deliberately gains, or attempts to gain, unauthorised access to a computer system with the intent to cause damage or steal data
- 9. A type of malicious software that is installed on a device without the user’s knowledge
- 10. An automatic check to ensure that data entered is sensible and feasible.
- 11. A way of preventing errors when data is copied from one medium to another.
- 14. A signal that is sent to the processor to request immediate attention
- 15. The process of gathering information about computer systems before a system is attacked
- 17. Most basic form of authentication