II-Crossword
Across
- 2. a criminal person who secretly finds a way of changing information on somebody else’s computer system without permission : _______ hat
- 4. sets of information that are too large to handle and analyze with standard methods: ________ data
- 8. a computer program designed specifically to damage or disrupt a system, such as a virus
- 9. a piece of software that you can download to a smart-phone, for example, to look up information or play a game
- 11. nucleic acid that is the main constituent of our chromosomes and is now also being used for data storage
- 12. a system of computer programming instructions
- 13. an area of study concerned with making computers copy intelligent human behaviour: ________ intelligence
- 14. Continue: Kilobyte, Megabyte, Gigabyte, Terabyte, Petabyte, Exabyte, ____________
- 15. an aircraft without a pilot, remotely controlled from the ground
- 17. digital currency invented by Satoshi Nakamoto and released as open-source software
Down
- 1. a biometric software application that can identify a specific individual in a digital image by analyzing the face patterns: _________ recognition
- 2. a fault in a computer system or program
- 3. the act of carefully watching a person, for example, via smartphone and internet tracking
- 5. a small piece of code which can be added to a computer program to correct a fault
- 6. a small computing device that you can wear, for example, on your wrist or on your head
- 7. KLOC is a scale to measure bugs in a software, e.g "one defect per KLOC". KLOC stands for "1000 ________ of code
- 8. a modification of content from a video game to make it operate differently from its original version
- 10. small block of data that is sent to an end computer via internet: IP ______
- 12. a way of storing and managing data via a network of servers to which users have excess over the internet: _______ computing
- 16. a program in which the source code is available to the public for modification: ________ source