Across
- 2. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a
- 4. Is a type of disk storage composed of a thin and flexible disk of a magnetic storage.
- 5. Used to print.
- 6. A word, phrase, or string of characters intended to differentiate an authorized user or process.
- 10. A device that converts analog audio signals into the audible sounds.
- 13. A set of things working together as parts of a mechanism or an interconnecting network; a complex whole.
- 14. Miniaturized video camera.
- 16. Instructions that tell a computer what to do.
- 17. an electronic device that reads and transfers data from various portable memory storage devices.
- 19. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information.
- 21. Computer device that is operated with one hand and allows you to direct the movement of the pointer on the screen to transmit various commands.
Down
- 1. A panel of keys that operate a computer or typewriter.
- 3. An output device that displays information in pictorial or text form.
- 6. The fraudulent practice of directing internet users to a bogus website.
- 7. A computer program with an interface.
- 8. Is a term used to describe an issue with the computer.
- 9. A device for reading and writing data on a magnetic disk.
- 11. Initials of universal serial bus.
- 12. Scam that obtains personal or banking information through the internet.
- 15. Abbreviation of compact disc read-only memory.
- 18. Serial advanced technology attachment.
- 20. Computer's main memory, where programs and data reside.
