Cs

1234567891011121314151617181920
Across
  1. 2. Malware that tracks and records a user's keystrokes, often used for stealing sensitive information.
  2. 5. the act of downloading or streaming music games and other programes or work without any credit or cracked
  3. 8. Driver Software that enables the operating system to communicate with and control specific hardware devices.
  4. 9. high level programming language
  5. 10. one example of operating system
  6. 11. physical components of a computer system.
  7. 14. one example of closed source software associated with microsoft
  8. 17. malware used to collect data from users (hint tlauncher funny)
  9. 18. Determines how much memory to allocate to each process.
  10. 20. A type of cyber attack that redirects website traffic to a malicious website without the user's knowledge or consent.
Down
  1. 1. A type of cyber attack where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
  2. 3. It takes responsibility for a range of functions including managing processor time, memory management, inputs/outputs, and security.
  3. 4. a type of license software that allows software code to be studied and changed by anyone.
  4. 6. practice of downloading or distributing digital content without permission
  5. 7. Swaps tasks in and out of the processor so it appears the computer is doing more than one task at the same time.
  6. 12. Malware that spreads by replicating itself and infecting other files or systems.
  7. 13. A type of malware that disguises itself as legitimate software or files.
  8. 15. Allocates time to processes that are deemed urgent.
  9. 16. low level programming language
  10. 19. A type of malware that encrypts files and demands a ransom for their release.