CS Review-VJ

12345678910111213
Across
  1. 1. system is system software that manages computer hardware and software resources, and provides common services for computer programs.
  2. 3. Social engineering attacks ___ people into sharing information that they shouldn’t share.
  3. 6. Are programs that are needed but run either without you being an active participant or only when you need to do repairs.
  4. 7. American Standard Code for Information Interchange.
  5. 10. The smallest unit of the memory storing one memory address or one piece of data
  6. 11. 2-FactorAuthentication is a ____ measure that requires two distinct forms of identification to verify your identity when accessing an account or service.
  7. 12. Faster memory built into the CPU itself.
  8. 13. The control unit breaks down the instruction storing needed data in registers.
Down
  1. 2. Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source.
  2. 4. Control unit fetches the instruction and tells____ what to do.
  3. 5. Any software that is design for bad purposes(to steal your money)
  4. 8. Transistor is a microscopic____ that can let that power through or not.
  5. 9. unicode a universal character encoding standard ____to represent text and symbols from all writing systems around the world.