Final Review Comp Found

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 2. Unique number assigned to every device connected to the internet
  2. 8. Software that prevents users from accessing their files or network until a ransom is paid.
  3. 10. Loop that will run continuously while checking if a condition is True or False
  4. 12. Software that runs hardware like mouse and printer
  5. 14. Protocol used when time is more important than accuracy, does NOT check packet number or order
  6. 16. Group of computers that can talk to each other
  7. 17. Hides complex inner working of the computer to make it easier for users to interact with
  8. 18. Set of code that can be called later in a program
  9. 19. Variable type that is a whole number
  10. 20. Allows users to request IP addresses using easy to remember words
  11. 22. Laws in California that protect consumers and regulates companies that collect and sell data
  12. 25. Variable type that contains words, letters, numbers, punctuation, spaces, etc.
  13. 27. Variable type that is a number with a decimal component
  14. 29. Legal document outlining how a company can collect and use your data
  15. 34. Type of knowledge base created to allow employees to collaborate and share company knowledge and solutions to common customer scenarios
  16. 36. Set of instructions given to a computer to tell it what to do
  17. 37. Original Addressing protocol made in the 80s that is made of 4 sets of numbers
  18. 38. Type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
  19. 40. Type of knowledge base created for customers to access and learn any and everything they’d like to know about a product, including common troubleshooting issues
  20. 42. Comment that is surrounded by three quotation marks and can span multiple lines
  21. 43. Comment that begins with a pound sign(#)
  22. 44. Hackers that attack computers for the fun and challenge of it all
  23. 45. Hackers that are sponsored by a country.
  24. 46. Loop that runs for a certain number of times
  25. 47. Group of hackers with ideological views but act with the intent to harm, typically resulting in violence
Down
  1. 1. Devices like a monitor or speaker
  2. 3. Software that secretly gathers information about a person or organization and sends it to an attacker
  3. 4. Physical components of a computer
  4. 5. A special software that manages all of the hardware and application software on a computer
  5. 6. Duplicated or replicated code within a program
  6. 7. Operating system that is open source
  7. 9. Programs that run on a computer
  8. 11. New Addressing protocol that uses 128 bits and is represented by 8 groups of 4 hexadecimal digits
  9. 13. Command that performs different actions depending on whether a condition is true or false
  10. 15. Laws in Europe that regulate how companies can collect personal data
  11. 19. Current or former employees who seek revenge on a company by abusing their access to files and passwords
  12. 21. Network of physical devices embedded with electronics which enables things to connect and exchange data
  13. 23. General term used to describe an individual or a group of hackers
  14. 24. Operating system used on iPhones
  15. 26. Specific group of hackers who are motivated by their ideological views.
  16. 28. Open source operating system used on phones
  17. 30. System that will operate with no interruption when one or more of its components fail
  18. 31. Protocol that allows for packets to be sent between computers and checks to make sure all packets are received and put in the correct order
  19. 32. Repeatable set of instructions that tells you exactly how to complete a task, step by step
  20. 33. Type of device that allows you to give information to your computer
  21. 35. Operating System created by Microsoft
  22. 38. Code that stores information in a program so that it can be used later
  23. 39. Variable type that is either True or False
  24. 41. Type of software that is designed to intentionally harm or damage a computer or network.
  25. 42. Operating system that is used by apple computers