Form 2 - Coursework 2. Term 2.

12345678910111213141516171819202122232425
Across
  1. 3. Voice over Internet ______.
  2. 7. Wireless internet connection.
  3. 8. Short text messages sent on mobile phones.
  4. 13. Scrambling data so only authorized people can read it.
  5. 14. Security staff who protect buildings and equipment.
  6. 15. The legal right of a creator to control their work.
  7. 17. A natural event that may damage data or computers.
  8. 18. Someone who gains unauthorized access to computer systems.
  9. 21. A secret word used to log into a computer system.
  10. 22. Software that protects your computer from harmful programs.
  11. 24. Rules that allow computers to communicate over the internet.
  12. 25. Used to physically secure equipment like doors and cabinets.
Down
  1. 1. Phone calls made using the internet.
  2. 2. Copying someone else's work and claiming it as your own.
  3. 4. Harmful software that damages computers.
  4. 5. A trick email used to steal personal information.
  5. 6. Devices used to monitor people in secure areas.
  6. 9. Physical parts of a computer system.
  7. 10. Illegal copying or distribution of software.
  8. 11. A program that blocks unwanted access to a network.
  9. 12. Sending messages electronically through the internet.
  10. 16. The accuracy, consistency, and reliability of data.
  11. 19. Dishonest activity intended to gain something illegally.
  12. 20. A type of messaging that happens instantly online.
  13. 23. The protection of data from unauthorized access.