Kenaz Crossword IMT Asg

1234567891011121314151617181920
Across
  1. 3. What is the name of the software that lets you use and alter or change the program freely?
  2. 5. Is it legal to copy other’s work if their work has been protected by copyright?
  3. 9. What type of attack is when a hacker makes a fake website and waits for someone to use it?
  4. 10. What is a program that has its main function to protect your computer from malware or other malicious programs?
  5. 12. What type of malware has its main function of grabbing the user’s private information without them knowing?
  6. 13. ____ your password regularly
  7. 14. A list that contains addresses to block
  8. 15. Is coding software (IDE) an interpreter or compiler?
  9. 17. Do games use compiled or interpreted codes?
  10. 19. What is the name of the program used to decrypt an encrypted message?
  11. 20. What is the name of the attack that floods a network to cause traffic?
Down
  1. 1. What type of authentication requires something related to the body? Like facial recognition or fingerprint
  2. 2. What is the process in the OS that manages RAM?
  3. 4. A list that contains addresses to pass through the filter
  4. 6. Is Python, C++ and java high-level or low-level language?
  5. 7. What is the name of the experts who try to hack a computer to find vulnerabilities?
  6. 8. What is the name of a security feature in a computer that monitors network traffic for malicious purposes, especially in unauthorised networks?
  7. 11. Encrypted text is also called a?
  8. 16. What does a trademark protect?
  9. 18. what does a patent protect?