11/10 Fndts Vocab

12345678910111213141516171819
Across
  1. 1. The background of the project where the Actors are placed
  2. 3. Hackers ethical hackers use skills for good, ethical and legal purposes to compromise networks/systems to discover network vulnerabilities in order to be fixed by developers
  3. 5. stops character from leaving a trial
  4. 8. Persistent Threat a continuous computer hack that occurs under the radar against a specific object
  5. 10. uses quotations marks at the beginning and end of this data; not recognized by the programming software
  6. 13. The order in which steps or events happen
  7. 14. determines how quickly an object will move through commands
  8. 15. A set of known actions that the computer can perform
  9. 17. A Tynker character or object that can talk and interact with others
  10. 19. this code is used to move objects forward
Down
  1. 2. Hackers individuals who commit crimes and unethical things, not for personal gain or damage, but to allow the affected organization to know of compromised or weakness in networks
  2. 4. uses a hashtag to begin the text that is unrecognized by the programming software used for informational purposes only
  3. 5. has character start drawing a trail
  4. 6. Broker grey hat hackers: attempt to discover exploits and report them to vendors, sometimes for prizes or rewards
  5. 7. Warning Systems provide information about potential attacks
  6. 9. The language that tells a computer what to do
  7. 11. A specific action or instruction that tells the computer to do something
  8. 12. Moves Tracy to a specified coordinate
  9. 16. Domains an area to be protected may be limited by a logical or physical boundary
  10. 18. Hackers unethical criminals that violate computer/network security