CS Review-VJ
Across
- 1. system is system software that manages computer hardware and software resources, and provides common services for computer programs.
- 3. Social engineering attacks ___ people into sharing information that they shouldn’t share.
- 6. Are programs that are needed but run either without you being an active participant or only when you need to do repairs.
- 7. American Standard Code for Information Interchange.
- 10. The smallest unit of the memory storing one memory address or one piece of data
- 11. 2-FactorAuthentication is a ____ measure that requires two distinct forms of identification to verify your identity when accessing an account or service.
- 12. Faster memory built into the CPU itself.
- 13. The control unit breaks down the instruction storing needed data in registers.
Down
- 2. Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source.
- 4. Control unit fetches the instruction and tells____ what to do.
- 5. Any software that is design for bad purposes(to steal your money)
- 8. Transistor is a microscopic____ that can let that power through or not.
- 9. unicode a universal character encoding standard ____to represent text and symbols from all writing systems around the world.