Across
- 1. The background of the project where the Actors are placed
- 3. Hackers ethical hackers use skills for good, ethical and legal purposes to compromise networks/systems to discover network vulnerabilities in order to be fixed by developers
- 5. stops character from leaving a trial
- 8. Persistent Threat a continuous computer hack that occurs under the radar against a specific object
- 10. uses quotations marks at the beginning and end of this data; not recognized by the programming software
- 13. The order in which steps or events happen
- 14. determines how quickly an object will move through commands
- 15. A set of known actions that the computer can perform
- 17. A Tynker character or object that can talk and interact with others
- 19. this code is used to move objects forward
Down
- 2. Hackers individuals who commit crimes and unethical things, not for personal gain or damage, but to allow the affected organization to know of compromised or weakness in networks
- 4. uses a hashtag to begin the text that is unrecognized by the programming software used for informational purposes only
- 5. has character start drawing a trail
- 6. Broker grey hat hackers: attempt to discover exploits and report them to vendors, sometimes for prizes or rewards
- 7. Warning Systems provide information about potential attacks
- 9. The language that tells a computer what to do
- 11. A specific action or instruction that tells the computer to do something
- 12. Moves Tracy to a specified coordinate
- 16. Domains an area to be protected may be limited by a logical or physical boundary
- 18. Hackers unethical criminals that violate computer/network security
