II-Crossword

1234567891011121314151617
Across
  1. 2. a criminal person who secretly finds a way of changing information on somebody else’s computer system without permission : _______ hat
  2. 4. sets of information that are too large to handle and analyze with standard methods: ________ data
  3. 8. a computer program designed specifically to damage or disrupt a system, such as a virus
  4. 9. a piece of software that you can download to a smart-phone, for example, to look up information or play a game
  5. 11. nucleic acid that is the main constituent of our chromosomes and is now also being used for data storage
  6. 12. a system of computer programming instructions
  7. 13. an area of study concerned with making computers copy intelligent human behaviour: ________ intelligence
  8. 14. Continue: Kilobyte, Megabyte, Gigabyte, Terabyte, Petabyte, Exabyte, ____________
  9. 15. an aircraft without a pilot, remotely controlled from the ground
  10. 17. digital currency invented by Satoshi Nakamoto and released as open-source software
Down
  1. 1. a biometric software application that can identify a specific individual in a digital image by analyzing the face patterns: _________ recognition
  2. 2. a fault in a computer system or program
  3. 3. the act of carefully watching a person, for example, via smartphone and internet tracking
  4. 5. a small piece of code which can be added to a computer program to correct a fault
  5. 6. a small computing device that you can wear, for example, on your wrist or on your head
  6. 7. KLOC is a scale to measure bugs in a software, e.g "one defect per KLOC". KLOC stands for "1000 ________ of code
  7. 8. a modification of content from a video game to make it operate differently from its original version
  8. 10. small block of data that is sent to an end computer via internet: IP ______
  9. 12. a way of storing and managing data via a network of servers to which users have excess over the internet: _______ computing
  10. 16. a program in which the source code is available to the public for modification: ________ source