Rubik's Cube

123456789101112131415
Across
  1. 3. This number system consists of digits 0 to 9 and letters A to F since with base 16 where A to F represents digits 10 to 15 ans it is known as Hex wher Hex=6 and Decimal=1
  2. 4. It is the act of sending an email to a user; misleading him to believe that it is from a trusted person or organisation and the user is asked to visit a website on which he is asked to update or validate history personal details,such as his username, password,and credit card details and in this way the operation of the fake website commit crimes in your name after stealing your identity
  3. 5. This processing may involve various kinds of arithmetic operations such as addition,subtraction, multiplication, division,etc., on binary numbers
  4. 8. It is the use of illegal methods to get money or other things that belong to a bank or it's customers
  5. 11. It refers to an illegal entry into a computer system or network and hackers write or use ready-made computer programs to attack the target computer
  6. 12. It refers to the act of stealing and misusing someone's personal information and it is a major threat for people who use internet for online shopping,cash transaction,and banking services
  7. 14. It is a collection of technologies,processes,and practices designed to protect network,computer, programs,and data from attack,damage,or unauthorised access
  8. 15. This number system(Oct) consists of digits 0 to 7 since with base 8 and reason behind development of this system was to make binary more compact
Down
  1. 1. This number system consists of digits 0 to 9 sice with base 10 are used to form any number and most arithmetic expression are performed with decimal numbers
  2. 2. In this program receiver of a message is fooled into believing that the message received by him is from trusted source which is actually not true and the message is bogus
  3. 6. This is any criminal activity intended to harm anyone using a computer and an internet connection
  4. 7. This number system consists of 0 and 1 since with base 2 and all digital computer use use this number system
  5. 9. It is an act of harming or harassing using information technology in a deliberate manner, spreading rumours about the person, posting embarrassing photos and videos to hurt the person making derogatory remarks against gender,race,or religion either on email or social networking sites
  6. 10. It is a program or a set of program that disrupts the normal functioning of a computer and it's full form is Vital Information Resources Under Seize
  7. 13. It is the process of 'befriending' children on social media to facilitate online or physical sexual abuse and the cyber groomer befriends a child with intention of sexual abuse, sexual exploitation,and trafficking and it has a deep impact on child's physical, emotional,and psychological well being