Technology Hunt

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 2. Someone who uses technical skills to gain unauthorized access to systems or data.
  2. 4. Sink Prevents the computer from overheating by cooling the CPU or GPU.
  3. 7. Exploit An attack that targets a previously unknown software vulnerability.
  4. 8. A weakness in a system that can be exploited by a threat actor.
  5. 9. A set of instructions or programs that tells a computer what to do.
  6. 11. A sequence of characters inside quotes (e.g., "hello").
  7. 17. An error or flaw in software that causes it to not work correctly.
  8. 18. Spaces at the beginning of lines that define blocks of code in Python.
  9. 21. The main circuit board that connects all computer components.
  10. 23. Captures video, often used for video calls and streaming.
  11. 24. A collection of ordered items (e.g., fruits = ['apple', 'banana']).
  12. 25. A name that stores a value, like a container (e.g., x = 5).
  13. 26. A collection of data or information stored on a computer.
  14. 27. Engineering Manipulating people into giving up confidential information.
  15. 28. A type of social engineering where attackers trick users into revealing sensitive information.
  16. 30. A block of reusable code that performs a specific task (e.g., def greet():).
  17. 32. Computing Using internet-based services to store and access data and software.
  18. 34. Malicious software designed to damage or gain unauthorized access to a computer.
  19. 35. Breach An incident where sensitive information is accessed without authorization.
  20. 37. Drive Long-term storage that uses spinning disks to store data.
  21. 39. The process of converting data into a code to prevent unauthorized access.
  22. 41. System (OS) The main software that manages computer hardware and other software (e.g., Windows, macOS, Linux).
  23. 42. Software that secretly gathers user information without consent.
  24. 46. Authentication (2FA) A security method that requires two types of identification to access a system.
  25. 47. A change or improvement to software that can fix bugs or add new features.
  26. 48. Interface Card Allows the computer to connect to the internet or a network.
  27. 49. Access Memory Short-term memory where data is stored temporarily while programs run.
Down
  1. 1. Input device used to type text and interact with the computer.
  2. 3. A small program that helps the operating system communicate with hardware devices.
  3. 5. Software that detects and removes viruses and other malware.
  4. 6. Displays the visual output from the computer.
  5. 10. A potential danger that could exploit a vulnerability to cause harm.
  6. 11. Card Handles audio input and output (often built into the motherboard).
  7. 12. Processing Unit Handles rendering images, video, and animations; essential for gaming and design.
  8. 13. Processing Unit The "brain" of the computer that performs calculations and runs programs.
  9. 14. Captures audio for recording or communication.
  10. 15. Used to include external code or libraries (e.g., import random).
  11. 16. Supply Unit Converts electricity from the wall into usable power for the computer.
  12. 17. A data type with two values: True or False.
  13. 19. Drive Reads and writes data from CDs, DVDs, or Blu-rays (less common today).
  14. 20. A software update that fixes security flaws or bugs.
  15. 22. The likelihood that a threat will exploit a vulnerability and cause damage.
  16. 29. State Drive Faster storage device with no moving parts used for storing files and programs.
  17. 31. Statement Used to make decisions in code based on conditions (e.g., if x > 0:).
  18. 33. Interface (UI) The part of the software that users interact with, like buttons and menus.
  19. 34. Pointing device used to interact with items on the screen.
  20. 36. (App) A software program designed to help users perform specific tasks (e.g., Word, Excel).
  21. 38. Repeats a block of code (e.g., for or while loop).
  22. 40. A security system that controls incoming and outgoing network traffic based on rules.
  23. 43. Connection points on a computer to plug in external devices like keyboards or monitors.
  24. 44. A whole number without a decimal (e.g., 10).
  25. 45. Output device that plays sound from the computer.