NW3CTF

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 4. the process of using scientific knowledge for collecting, analyzing, and presenting evidence to the courts
  2. 5. globally unique identifier
  3. 7. software or hardware that prevents changes being made to data on media (2 words)
  4. 9. most common type of computer port used in today's computers
  5. 10. Bill Gates operating system
  6. 12. the process of using a mathematical algorithm against data to produce a hexadecimal value that is representative of that data
  7. 14. portable computer
  8. 16. also know as a property list
  9. 17. logical block addressing
  10. 18. unpartitioned space
  11. 21. a word that acts as the key to a cipher or code
  12. 25. 1024 zettabytes
  13. 28. needed to logon or open an encrypted container
  14. 29. data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both
  15. 30. an area of the hard drive that is not accessible by the OS
  16. 33. a hierarchical database used to store information necessary to configure the system for one or more users, applications, and hardware devices
  17. 35. unified extensible firmware interface
  18. 37. the process of converting information or data into a code, especially to prevent unauthorized access
  19. 39. _____ files are a group of keys, sub-keys, values, and data which make up a branch of the hierarchical registry tree
  20. 40. Mac built encryption
  21. 41. mobile computing device bigger than a cellphone but smaller than a laptop
  22. 43. a platform on which all other software functions operate (2 words)
  23. 44. 0's and 1's, base 2
  24. 45. message digest 5
  25. 46. random access memory
  26. 47. a _____ container prevents signal from entering or exiting
  27. 48. number scheme that is base 16
Down
  1. 1. removal of memory chip from a device
  2. 2. 1024 gigabytes
  3. 3. Windows built in encryption
  4. 6. a structured set of data held in a computer, especially one that is accessible in various ways
  5. 8. four bits
  6. 9. two bytes are used to represent one character
  7. 11. the storage area of a hard drive ranging from the end of a stored file to the end of that file cluster (2 words)
  8. 13. open source operating system used for smartphones and tablet computers
  9. 15. transfer (data) from main memory to temporary storage in readiness for later use
  10. 19. collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data
  11. 20. the process used to keep all cells on NAND memory roughly the same level of use (2 words)
  12. 22. detailed examination of data on digital media
  13. 23. the system that the OS and other programs use to keep track of files and disk space (2 words)
  14. 24. used in a dictionary attack
  15. 26. basic input output system
  16. 27. secure hash algoritm
  17. 31. Steve Jobs operating system
  18. 32. American standard code for information interchange
  19. 34. smallest physical storage unit on a disk
  20. 36. whole number; a number that is not a fraction
  21. 38. sometimes referred to as the. net or web
  22. 42. a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems, and which operates independently of a central bank.
  23. 47. a bit by bit capture and storage of data without changing or manipulating any of the bits (2 words)