Across
- 3. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- 5. the procedure for making extra copies of data in case the original is lost or damaged
- 7. a group or system of interconnected people or things
- 9. copy (data) from one computer system to another, typically over the Internet
- 10. the programs and other operating information used by a computer
- 12. someone who breaks into someone else's computer system, often on a network
- 13. a person who uses or operates something, especially a computer or other machine
- 16. not having official permission or approval
- 18. to change (information) from one form to another especially to hide its meaning
- 21. a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position
- 23. the action of protecting someone or something, or the state of being protected
- 24. a cellular phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications
- 28. a panel of keys that operate a computer or typewriter
- 29. an insulated wire or wires having a protective casing and used for transmitting electricity or telecommunication signals
- 30. a string of characters that allows access to a computer, interface, or system
- 33. an act of logging in to a computer, database, or system
- 35. the state of being free from danger or threat
Down
- 1. a computer that is portable and suitable for use while traveling
- 2. a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- 3. an aggressive and violent action against a person or place
- 4. facts provided or learned about something or someone
- 6. the state of being free from public attention.
- 8. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- 11. the practice of taking someone else's work or ideas and passing them off as one's own
- 13. an identification used by a person with access to a computer, network, or online service
- 14. Expose (someone or something valued) to danger, harm, or loss
- 15. the machines, wiring, and other physical components of a computer or other electronic system
- 17. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- 19. an electronic communications network that connects computer networks and organizational computer facilities around the world
- 20. the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media
- 22. irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
- 25. Software designed to detect and destroy computer viruses
- 26. A person who uses computers to gain unauthorized access to data
- 27. the kind of hacking that refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers.
- 31. obtain, examine, or retrieve (data or a file)
- 32. a location connected to the Internet that maintains one or more pages on the World Wide Web
- 34. a flat panel or area on an electronic device such as a television, computer, or smartphone, on which images and data are displayed