Safe Surfing and Computer Component Study Guide

1234567891011121314
Across
  1. 2. this is the second step done to the input information and is needed for a computer to give an output.
  2. 5. the __________ System: master program that manages how software uses the hardware of a computer
  3. 6. this is the first step needed for a computer to give an output
  4. 8. an attack when a hacker sends a fake email to steal login credentials
  5. 10. hacker a person who tries to find network vulnerabilities to help fix the problem and prevent actual cyberattacks
  6. 13. attacks include Trojan, adware, and spyware
  7. 14. physical devices like circuits, chips, wires, speakers, plugs, and more
Down
  1. 1. all of the computer programs, or code. It includes things like apps, games, websites, maps, and more
  2. 3. this is the last step after a computer receives input, stores information, and processes the information
  3. 4. an attack when the hacker gains access to the information path between the user and website. This commonly happens with unsecured Wi-Fi networks and malware
  4. 7. code that is the most basic form of software and controls all the hardware of a computer
  5. 8. this occurs after the information is stored.
  6. 9. the ______________ processing unit that calculates information
  7. 11. an attack when someone tries to guess your password
  8. 12. the person who carries out a cyberattack