Across
- 3. What is the name of the software that lets you use and alter or change the program freely?
- 5. Is it legal to copy other’s work if their work has been protected by copyright?
- 9. What type of attack is when a hacker makes a fake website and waits for someone to use it?
- 10. What is a program that has its main function to protect your computer from malware or other malicious programs?
- 12. What type of malware has its main function of grabbing the user’s private information without them knowing?
- 13. ____ your password regularly
- 14. A list that contains addresses to block
- 15. Is coding software (IDE) an interpreter or compiler?
- 17. Do games use compiled or interpreted codes?
- 19. What is the name of the program used to decrypt an encrypted message?
- 20. What is the name of the attack that floods a network to cause traffic?
Down
- 1. What type of authentication requires something related to the body? Like facial recognition or fingerprint
- 2. What is the process in the OS that manages RAM?
- 4. A list that contains addresses to pass through the filter
- 6. Is Python, C++ and java high-level or low-level language?
- 7. What is the name of the experts who try to hack a computer to find vulnerabilities?
- 8. What is the name of a security feature in a computer that monitors network traffic for malicious purposes, especially in unauthorised networks?
- 11. Encrypted text is also called a?
- 16. What does a trademark protect?
- 18. what does a patent protect?
