Computer Science Practice
Across
- 4. A set of access control tools that can limit the time period in which the material can be used
- 6. Allows an original idea to be protected.
- 8. The means by which users of the computer interact with the computer and receive the information that it processes.
- 10. Protects indications of the commercial source of a product or service and remain in force as long as they are actively used or registered.
- 11. Someone who deliberately gains, or attempts to gain, unauthorised access to a computer system with the intent to cause damage or steal data
- 12. An attack in which the victim receives a message disguised to look like it has come from a reputable source
- 15. The user being sent to a fake website that the user believes is the real one
- 16. Process of gathering information about computer systems before a system is attacked
- 17. Translate and execute each line of source code one by one.
- 18. A situation where a hacker hacks the connection between two people or systems and intercepts the data they are passing to each other.
Down
- 1. Acts as a platform on which the other software can run
- 2. To convert(information or data)into a cipher or code, especially to prevent unauthorized access.
- 3. It is non-free, meaning there are restrictions placed on the user.
- 5. Experts in computer security who attempt to gain access to a computer system in order to find vulnerabilities.
- 7. Recording how memory in the computer is divided and identified so that memory is allocated efficiently between processes that are running
- 9. Usually sits between a trusted network (such as your home network) and an untrusted network (such as the internet)
- 13. Translate assembly code programs into executable code.
- 14. Software that gives the freedom for the user to use, distribute, and modify the source code
- 19. An attack comes from a network of distributed computer systems, typically a botnet.