Across
- 3. Using faults in a computer or network, typically to gain unallowed access or personal data.
- 4. An external memory device that either inputs or outputs information.
- 6. Short-term memory that can be swiftly accessed.
- 8. Policies designed to defend from breaches, misuse, and modifications.
- 13. A technology used to link computers and peripherals.
- 14. A form of protection intended to block unauthorized access.
- 16. The exclusive and legal right to utilize a property.
- 18. The rules on how to be respectful and appropriate when communicating on the internet.
Down
- 1. A device used for storing or moving data electronically.
- 2. A network of telecommunications that spans over a large area.
- 5. The act of taking another person’s work or ideas and calling it your own.
- 7. A piece or part of something.
- 9. A storage device that uses flash-based memory.
- 10. The part of a computer that handles the processing of commands.
- 11. A database built through the collaboration of a group of users.
- 12. Uninvited messages sent through the internet, usually to a large number of people.
- 14. A doctrine that permits the use of copyrighted material under specific conditions.
- 15. A group of computers linked together through a wireless connection inside a limited location.
- 17. A storage device that uses magnetic storage.
