Computer Science Assignment

1234567891011121314151617181920
Across
  1. 6. The illegal copying of software or data (e.g. movies) without regard to copyright
  2. 8. a form of malware that locks a computer or encrypts files, and therefore prevents a user from accessing their data
  3. 12. A user being sent to a fake website that the user believes is the real one.
  4. 13. Ensuring that resources are protected from unauthorised access
  5. 16. responsible for compressing and decompressing files you have saved on your device
  6. 18. A set of instructions, data or programs used to operate computers and execute specific tasks.
  7. 19. The computer's tangible components or delivery systems that store and run the written instructions provided by the software.
  8. 20. A type of surveillance technology used to monitor and record each keystroke on a specific computer.
Down
  1. 1. A piece of software that appears to be legitimate, to trick the user into executing it
  2. 2. Makes sure that data is unreadable if intercepted
  3. 3. Malicious form of self-replicating software that attaches itself to other programs or files
  4. 4. An attack in which the victim receives a message (by email, text or social media) disguised to look like it has come from a reputable source
  5. 5. software that looks at all of the data on a hard drive and reorganises it, so that related data is stored together.
  6. 7. Someone who deliberately gains, or attempts to gain, unauthorised access to a computer system with the intent to cause damage or steal data
  7. 9. A type of malicious software that is installed on a device without the user’s knowledge
  8. 10. An automatic check to ensure that data entered is sensible and feasible.
  9. 11. A way of preventing errors when data is copied from one medium to another.
  10. 14. A signal that is sent to the processor to request immediate attention
  11. 15. The process of gathering information about computer systems before a system is attacked
  12. 17. Most basic form of authentication