Across
- 2. Unique number assigned to every device connected to the internet
- 8. Software that prevents users from accessing their files or network until a ransom is paid.
- 10. Loop that will run continuously while checking if a condition is True or False
- 12. Software that runs hardware like mouse and printer
- 14. Protocol used when time is more important than accuracy, does NOT check packet number or order
- 16. Group of computers that can talk to each other
- 17. Hides complex inner working of the computer to make it easier for users to interact with
- 18. Set of code that can be called later in a program
- 19. Variable type that is a whole number
- 20. Allows users to request IP addresses using easy to remember words
- 22. Laws in California that protect consumers and regulates companies that collect and sell data
- 25. Variable type that contains words, letters, numbers, punctuation, spaces, etc.
- 27. Variable type that is a number with a decimal component
- 29. Legal document outlining how a company can collect and use your data
- 34. Type of knowledge base created to allow employees to collaborate and share company knowledge and solutions to common customer scenarios
- 36. Set of instructions given to a computer to tell it what to do
- 37. Original Addressing protocol made in the 80s that is made of 4 sets of numbers
- 38. Type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
- 40. Type of knowledge base created for customers to access and learn any and everything they’d like to know about a product, including common troubleshooting issues
- 42. Comment that is surrounded by three quotation marks and can span multiple lines
- 43. Comment that begins with a pound sign(#)
- 44. Hackers that attack computers for the fun and challenge of it all
- 45. Hackers that are sponsored by a country.
- 46. Loop that runs for a certain number of times
- 47. Group of hackers with ideological views but act with the intent to harm, typically resulting in violence
Down
- 1. Devices like a monitor or speaker
- 3. Software that secretly gathers information about a person or organization and sends it to an attacker
- 4. Physical components of a computer
- 5. A special software that manages all of the hardware and application software on a computer
- 6. Duplicated or replicated code within a program
- 7. Operating system that is open source
- 9. Programs that run on a computer
- 11. New Addressing protocol that uses 128 bits and is represented by 8 groups of 4 hexadecimal digits
- 13. Command that performs different actions depending on whether a condition is true or false
- 15. Laws in Europe that regulate how companies can collect personal data
- 19. Current or former employees who seek revenge on a company by abusing their access to files and passwords
- 21. Network of physical devices embedded with electronics which enables things to connect and exchange data
- 23. General term used to describe an individual or a group of hackers
- 24. Operating system used on iPhones
- 26. Specific group of hackers who are motivated by their ideological views.
- 28. Open source operating system used on phones
- 30. System that will operate with no interruption when one or more of its components fail
- 31. Protocol that allows for packets to be sent between computers and checks to make sure all packets are received and put in the correct order
- 32. Repeatable set of instructions that tells you exactly how to complete a task, step by step
- 33. Type of device that allows you to give information to your computer
- 35. Operating System created by Microsoft
- 38. Code that stores information in a program so that it can be used later
- 39. Variable type that is either True or False
- 41. Type of software that is designed to intentionally harm or damage a computer or network.
- 42. Operating system that is used by apple computers
