Computer Science Practice

12345678910111213141516171819
Across
  1. 4. A set of access control tools that can limit the time period in which the material can be used
  2. 6. Allows an original idea to be protected.
  3. 8. The means by which users of the computer interact with the computer and receive the information that it processes.
  4. 10. Protects indications of the commercial source of a product or service and remain in force as long as they are actively used or registered.
  5. 11. Someone who deliberately gains, or attempts to gain, unauthorised access to a computer system with the intent to cause damage or steal data
  6. 12. An attack in which the victim receives a message disguised to look like it has come from a reputable source
  7. 15. The user being sent to a fake website that the user believes is the real one
  8. 16. Process of gathering information about computer systems before a system is attacked
  9. 17. Translate and execute each line of source code one by one.
  10. 18. A situation where a hacker hacks the connection between two people or systems and intercepts the data they are passing to each other.
Down
  1. 1. Acts as a platform on which the other software can run
  2. 2. To convert(information or data)into a cipher or code, especially to prevent unauthorized access.
  3. 3. It is non-free, meaning there are restrictions placed on the user.
  4. 5. Experts in computer security who attempt to gain access to a computer system in order to find vulnerabilities.
  5. 7. Recording how memory in the computer is divided and identified so that memory is allocated efficiently between processes that are running
  6. 9. Usually sits between a trusted network (such as your home network) and an untrusted network (such as the internet)
  7. 13. Translate assembly code programs into executable code.
  8. 14. Software that gives the freedom for the user to use, distribute, and modify the source code
  9. 19. An attack comes from a network of distributed computer systems, typically a botnet.