Technology Hunt
Across
- 2. Someone who uses technical skills to gain unauthorized access to systems or data.
- 4. Sink Prevents the computer from overheating by cooling the CPU or GPU.
- 7. Exploit An attack that targets a previously unknown software vulnerability.
- 8. A weakness in a system that can be exploited by a threat actor.
- 9. A set of instructions or programs that tells a computer what to do.
- 11. A sequence of characters inside quotes (e.g., "hello").
- 17. An error or flaw in software that causes it to not work correctly.
- 18. Spaces at the beginning of lines that define blocks of code in Python.
- 21. The main circuit board that connects all computer components.
- 23. Captures video, often used for video calls and streaming.
- 24. A collection of ordered items (e.g., fruits = ['apple', 'banana']).
- 25. A name that stores a value, like a container (e.g., x = 5).
- 26. A collection of data or information stored on a computer.
- 27. Engineering Manipulating people into giving up confidential information.
- 28. A type of social engineering where attackers trick users into revealing sensitive information.
- 30. A block of reusable code that performs a specific task (e.g., def greet():).
- 32. Computing Using internet-based services to store and access data and software.
- 34. Malicious software designed to damage or gain unauthorized access to a computer.
- 35. Breach An incident where sensitive information is accessed without authorization.
- 37. Drive Long-term storage that uses spinning disks to store data.
- 39. The process of converting data into a code to prevent unauthorized access.
- 41. System (OS) The main software that manages computer hardware and other software (e.g., Windows, macOS, Linux).
- 42. Software that secretly gathers user information without consent.
- 46. Authentication (2FA) A security method that requires two types of identification to access a system.
- 47. A change or improvement to software that can fix bugs or add new features.
- 48. Interface Card Allows the computer to connect to the internet or a network.
- 49. Access Memory Short-term memory where data is stored temporarily while programs run.
Down
- 1. Input device used to type text and interact with the computer.
- 3. A small program that helps the operating system communicate with hardware devices.
- 5. Software that detects and removes viruses and other malware.
- 6. Displays the visual output from the computer.
- 10. A potential danger that could exploit a vulnerability to cause harm.
- 11. Card Handles audio input and output (often built into the motherboard).
- 12. Processing Unit Handles rendering images, video, and animations; essential for gaming and design.
- 13. Processing Unit The "brain" of the computer that performs calculations and runs programs.
- 14. Captures audio for recording or communication.
- 15. Used to include external code or libraries (e.g., import random).
- 16. Supply Unit Converts electricity from the wall into usable power for the computer.
- 17. A data type with two values: True or False.
- 19. Drive Reads and writes data from CDs, DVDs, or Blu-rays (less common today).
- 20. A software update that fixes security flaws or bugs.
- 22. The likelihood that a threat will exploit a vulnerability and cause damage.
- 29. State Drive Faster storage device with no moving parts used for storing files and programs.
- 31. Statement Used to make decisions in code based on conditions (e.g., if x > 0:).
- 33. Interface (UI) The part of the software that users interact with, like buttons and menus.
- 34. Pointing device used to interact with items on the screen.
- 36. (App) A software program designed to help users perform specific tasks (e.g., Word, Excel).
- 38. Repeats a block of code (e.g., for or while loop).
- 40. A security system that controls incoming and outgoing network traffic based on rules.
- 43. Connection points on a computer to plug in external devices like keyboards or monitors.
- 44. A whole number without a decimal (e.g., 10).
- 45. Output device that plays sound from the computer.