Cs
Across
- 2. Malware that tracks and records a user's keystrokes, often used for stealing sensitive information.
- 5. the act of downloading or streaming music games and other programes or work without any credit or cracked
- 8. Driver Software that enables the operating system to communicate with and control specific hardware devices.
- 9. high level programming language
- 10. one example of operating system
- 11. physical components of a computer system.
- 14. one example of closed source software associated with microsoft
- 17. malware used to collect data from users (hint tlauncher funny)
- 18. Determines how much memory to allocate to each process.
- 20. A type of cyber attack that redirects website traffic to a malicious website without the user's knowledge or consent.
Down
- 1. A type of cyber attack where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
- 3. It takes responsibility for a range of functions including managing processor time, memory management, inputs/outputs, and security.
- 4. a type of license software that allows software code to be studied and changed by anyone.
- 6. practice of downloading or distributing digital content without permission
- 7. Swaps tasks in and out of the processor so it appears the computer is doing more than one task at the same time.
- 12. Malware that spreads by replicating itself and infecting other files or systems.
- 13. A type of malware that disguises itself as legitimate software or files.
- 15. Allocates time to processes that are deemed urgent.
- 16. low level programming language
- 19. A type of malware that encrypts files and demands a ransom for their release.