Across
- 2. this is the second step done to the input information and is needed for a computer to give an output.
- 5. the __________ System: master program that manages how software uses the hardware of a computer
- 6. this is the first step needed for a computer to give an output
- 8. an attack when a hacker sends a fake email to steal login credentials
- 10. hacker a person who tries to find network vulnerabilities to help fix the problem and prevent actual cyberattacks
- 13. attacks include Trojan, adware, and spyware
- 14. physical devices like circuits, chips, wires, speakers, plugs, and more
Down
- 1. all of the computer programs, or code. It includes things like apps, games, websites, maps, and more
- 3. this is the last step after a computer receives input, stores information, and processes the information
- 4. an attack when the hacker gains access to the information path between the user and website. This commonly happens with unsecured Wi-Fi networks and malware
- 7. code that is the most basic form of software and controls all the hardware of a computer
- 8. this occurs after the information is stored.
- 9. the ______________ processing unit that calculates information
- 11. an attack when someone tries to guess your password
- 12. the person who carries out a cyberattack