Risk

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 3. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
  2. 5. the procedure for making extra copies of data in case the original is lost or damaged
  3. 7. a group or system of interconnected people or things
  4. 9. copy (data) from one computer system to another, typically over the Internet
  5. 10. the programs and other operating information used by a computer
  6. 12. someone who breaks into someone else's computer system, often on a network
  7. 13. a person who uses or operates something, especially a computer or other machine
  8. 16. not having official permission or approval
  9. 18. to change (information) from one form to another especially to hide its meaning
  10. 21. a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position
  11. 23. the action of protecting someone or something, or the state of being protected
  12. 24. a cellular phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications
  13. 28. a panel of keys that operate a computer or typewriter
  14. 29. an insulated wire or wires having a protective casing and used for transmitting electricity or telecommunication signals
  15. 30. a string of characters that allows access to a computer, interface, or system
  16. 33. an act of logging in to a computer, database, or system
  17. 35. the state of being free from danger or threat
Down
  1. 1. a computer that is portable and suitable for use while traveling
  2. 2. a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  3. 3. an aggressive and violent action against a person or place
  4. 4. facts provided or learned about something or someone
  5. 6. the state of being free from public attention.
  6. 8. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
  7. 11. the practice of taking someone else's work or ideas and passing them off as one's own
  8. 13. an identification used by a person with access to a computer, network, or online service
  9. 14. Expose (someone or something valued) to danger, harm, or loss
  10. 15. the machines, wiring, and other physical components of a computer or other electronic system
  11. 17. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  12. 19. an electronic communications network that connects computer networks and organizational computer facilities around the world
  13. 20. the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media
  14. 22. irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
  15. 25. Software designed to detect and destroy computer viruses
  16. 26. A person who uses computers to gain unauthorized access to data
  17. 27. the kind of hacking that refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers.
  18. 31. obtain, examine, or retrieve (data or a file)
  19. 32. a location connected to the Internet that maintains one or more pages on the World Wide Web
  20. 34. a flat panel or area on an electronic device such as a television, computer, or smartphone, on which images and data are displayed