|
"S3CL Ch6 Internet Security": HTML5 Crossword |
Across2. It will damage the data on the computer and infect other programs as well. (5)
4. Short form for malicious software. (7)
5. Old versions of software could be ______ to virus attacks. (5)
7. Hackers may use security __________ in the older versions of operating systems to damage our devices. (9)
10. Victims are told a convincing story and persuaded to provide their personal information or to transfer their money. (10)
13. It takes place when an Internet user is threatened, harassed, or embarrassed by another Internet user. (13)
15. ________ engineering means manipulating other people in order to gain confidential information from the victims. (6)
16. This was hacked lollllllllllllf̶̨̢̛̛͖̪͚̰̫̥̣͈͉̻̙̹̗̫͎̬͕̬̪͇̘̣̺̤̰̘̜̻̩̯̤͓̪͕̫͇̩̐̒̈͌͊͆͐͋̂͑͂̏́̈̀̽̈́͐͊͑̇͑̅͌̈̓̒͗͆̎̾͑̓̐̆̓͐̕̕͘͘͜͜͝f̷̡̢̨̝̯̱̪̜̰͍̻͚̙͓͇̞͙̪̱͇̭͎̟̱̬͇̼̩̺̺̱̻̼̿̎͛͗̇͐͘͜͠ͅf̵̨̢̛̛̟̼̝͖̮̺̠͔̳̾͂̇͐̌̅͒̑͛̋̋̀͐̂̅̀̓́͛̃̄̈̕͜͝͝f̴̧̛̛͚̙͖̥̼̼̙̻̺̙͎̃̈́̓̓͌͗͌̈́́̎̈́̀̈́̋̑̀̀̄̒̽͌͘͠͝f̸̢̧̻̰͖̘̯͚̺͍̖͓͕͉̹͙̞̗̟̭̍́́̈̂̽̇̊̓͊̎̆̆̐̿̂͗̽̈̒͆̀͋̾̓̚ͅf̷̛̼͔͔͚̙̣̳̜̬̠̭̝͎̥̆̃̊͌̒̇͗̆̈́͌̉̒̐͗̈́̈́̆̆̃͒̈͋̂̍̔̀́̚̕͘͜͠f̸̛͎͓͕̞̲͉̝͔̻̅̆̍̇̄̀͠ͅͅf̸̢̧͍̯̝͕̺̰̘̦̹̳̱̜̣̮̱̳̤̬̞͎̬̰̓͆̿̓̓́́̽̒̍̀̓̿̂̇́͗̇̑͘f̸̧̞̦̣̟̩̦͎̩͔̭͚̹̹̗̦̙͍̼͋̈́̎͂̆̈́̔̇̈̌́́̓̐̇̃͊̌͗̓̾͊͌͘f̵̡̨̢̢̨̡̛̛̼̤͙̜͖͈̪͍͇̠̻̦̻̥̫͇̜̣͚̘̦̫̱͖͉̭̗̭̫̯̻̳͔̤͔͍̤̽̈́̈́̽͆̓̀̅͐̍̍̇̎̽̆͋̈́̈̓͂̉̎̈͛̽̕̕͜͜͝͝ͅf̶̨͔̫̪̭̼̮̘̞̙̯̜̹̋̓̓̾́̑̅̇̈́͂̆̓͆̀̅̋̀̉̉̆̃͌̅͊̌̈́̇̆͗́͂̃̍͆͘̕͘̕͘͜͠͠͝͠͝͝͝͠͝f̸̢̛̺̰̟͓̙̗͙̮̩̃̊͛̃͋̎͗́̓̂͛͂̇͑͆͊͑͌͗̆̽̽̐̈́̽̅͌̏̚͘f̸̧͓̺̘͉̼̺͕͈̯̖̫͓̩͗̿̀f̸̢͍̫̳̲̟͎̫͓͙͙̰͍̬̪͇͛̓̀̈́̃̌̈́̃͐͊̅̐̔͂́̋̔̓̽̒͘͜͠͝͝f̷̡̠̟̼̠̪̼̈̽̓̕f̶̨̢̥͙͔̻͔̗̟͚̝̗̝̗͕͖̣͈̯̥͚̼̳͍̖̘͇̗̠̻̲̠̞̭̼̪̭̭̼̘̜̰̹̩̲̌̿̈̾͂̒͋̈́͑͆̈̌̈́̈̃́́̿́͊̂̽͘̚͘̚͝ͅͅf̸̧̨̡̡̨͓̣͚̙̜̣̩͔͉̟̫̰̰̪̲̪͓͙̱̮̤͉̻̠̞͓̣̤͚̗̻̪̝͎̦̫̲̖͍̓̎̔̏͑̊̄̔̍̾͑̈̅͆̓̓̍̓̾̋̈́̅̊̈́̏̕̕̕͘̕͜͝ͅf̶̢̨̞̹̦͓̘̤̭̠̙̳͎͖͙͖̥́̃̀̓̑̿̄̅̄̅̃͛̋͊̿̓̀͆̇̈̍͐̋̌͌̊̉̽͛́̓̋̉͒̊̍̒̏̎̕͘̚f̴̧̢̡̨̡̛͇͓̖̫̦̭̣̬͉̰̣̞̳̳̘̜̺̦̹̙̻̯͓͇͉̜͈̭̳̮͚̘̳̪̬̱̃̐̈́̀͑͊̄̊̍́̎̔͘̚͜͝͝f̵̨̨̠̦̬͙̥̱͖̲͚̝̭̲̳̘̗̱͚̮̬̪̰̳͉̦̱̟͖̿̋͑̈̒̂̃͊̈̃͋̕͘͜͝͝f̷̡̡̛̛͇̫͇̼̭̗̪̮̲̤̮̙̲͑̈́́̂̄̅̊͒̽̽͛͐́̇́̀͂̓̆̉͂̒̏͆͋͂͛̂̒́̇͘̚̚̚̕͘̚͘͝͝͠͠f̶̧̡̨̡̨̛̥̜̰̬͎̩̺͍͖̰̻̹̗̗̼̻̪̺̰̘̬̺̦̝̠͉̻̫͙̻̺̘̥͓̖̐͊̿̿̄̀̄̓͘͜͜͝f̵̨͍̠̼͚̹̣̝͓̗̻̲̰͖̜̿̅̅͐̄͛̆̆̊͊̂̃͛̽̋̋̊͐̽̑͒̄̏̔̓̽̔̔̄̐̓̍͘̚̕̚͘͝f̴̧̛̙̹̼̻͙̩̥̣͍̺̦̩͇̭̼͇̼̪̙͚̹̪̤̓̆̂͂̎͗́͗̇́̓̆͒̓͒̿͑̀̽̈́̿̆́͂̈́̃̓̐̉̈́̐͒̀̚̚͜ͅͅf̶̧̧̡̨̨̨̛̪̞̮͎̥̞̤̪̙̭̗̞̲͉̖̲̬̪̦̳͉̗̺̬̼̝̭̭͔̆̿͗̊̈͑̃̋̈̆́̿̆̋̄̈̍̈́͂̍́̓̈́̽̈́̍̈͌͂̍̈́̅̈͑̓͆̓͌́͋͐̽͘͘̚͜f̷̡̛̛͔͇̪͈͎̱̙̰͊̈̄͐̋͒͛̈́̓̆̅̃͂̍̆̉̐̃̀̑̐̽̉̀͝f̶̢̧̛̛̛̖̱̭̗͓̼̼̙̤̱̬̦̲̗̭̓̇̊̔̉̉͐̿͒̈́̇̆̍̀̿̅́͌̔̀̿̔͆̄͆͂͋͗̿͂̽̃̊̓̽̿̕͠͠͠͝ (0,4,0)
17. Anti-virus software scans running applications so viruses can be _______ and removed immediately. (8)
|
|
Down1. A software or hardware device that can monitor and control network traffic. (8)
3. Trojan hourse allows the _______ to infiltrate the computer system. (6)
6. Most __________ systems nowadays include firewall software. (9)
8. A malware that can replicate themselves and spread through computer networks automatically. (4)
9. A set of conventions governing people's behaviour in an online environment. (10)
11. Unlike computer viruses, Trojan horses do not ________ themselves. (9)
12. Turn on the auto-update function of anti-virus software to update the virus __________. (9)
14. This was hacked lollllllllllllf̶̨̢̛̛͖̪͚̰̫̥̣͈͉̻̙̹̗̫͎̬͕̬̪͇̘̣̺̤̰̘̜̻̩̯̤͓̪͕̫͇̩̐̒̈͌͊͆͐͋̂͑͂̏́̈̀̽̈́͐͊͑̇͑̅͌̈̓̒͗͆̎̾͑̓̐̆̓͐̕̕͘͘͜͜͝f̷̡̢̨̝̯̱̪̜̰͍̻͚̙͓͇̞͙̪̱͇̭͎̟̱̬͇̼̩̺̺̱̻̼̿̎͛͗̇͐͘͜͠ͅf̵̨̢̛̛̟̼̝͖̮̺̠͔̳̾͂̇͐̌̅͒̑͛̋̋̀͐̂̅̀̓́͛̃̄̈̕͜͝͝f̴̧̛̛͚̙͖̥̼̼̙̻̺̙͎̃̈́̓̓͌͗͌̈́́̎̈́̀̈́̋̑̀̀̄̒̽͌͘͠͝f̸̢̧̻̰͖̘̯͚̺͍̖͓͕͉̹͙̞̗̟̭̍́́̈̂̽̇̊̓͊̎̆̆̐̿̂͗̽̈̒͆̀͋̾̓̚ͅf̷̛̼͔͔͚̙̣̳̜̬̠̭̝͎̥̆̃̊͌̒̇͗̆̈́͌̉̒̐͗̈́̈́̆̆̃͒̈͋̂̍̔̀́̚̕͘͜͠f̸̛͎͓͕̞̲͉̝͔̻̅̆̍̇̄̀͠ͅͅf̸̢̧͍̯̝͕̺̰̘̦̹̳̱̜̣̮̱̳̤̬̞͎̬̰̓͆̿̓̓́́̽̒̍̀̓̿̂̇́͗̇̑͘f̸̧̞̦̣̟̩̦͎̩͔̭͚̹̹̗̦̙͍̼͋̈́̎͂̆̈́̔̇̈̌́́̓̐̇̃͊̌͗̓̾͊͌͘f̵̡̨̢̢̨̡̛̛̼̤͙̜͖͈̪͍͇̠̻̦̻̥̫͇̜̣͚̘̦̫̱͖͉̭̗̭̫̯̻̳͔̤͔͍̤̽̈́̈́̽͆̓̀̅͐̍̍̇̎̽̆͋̈́̈̓͂̉̎̈͛̽̕̕͜͜͝͝ͅf̶̨͔̫̪̭̼̮̘̞̙̯̜̹̋̓̓̾́̑̅̇̈́͂̆̓͆̀̅̋̀̉̉̆̃͌̅͊̌̈́̇̆͗́͂̃̍͆͘̕͘̕͘͜͠͠͝͠͝͝͝͠͝f̸̢̛̺̰̟͓̙̗͙̮̩̃̊͛̃͋̎͗́̓̂͛͂̇͑͆͊͑͌͗̆̽̽̐̈́̽̅͌̏̚͘f̸̧͓̺̘͉̼̺͕͈̯̖̫͓̩͗̿̀f̸̢͍̫̳̲̟͎̫͓͙͙̰͍̬̪͇͛̓̀̈́̃̌̈́̃͐͊̅̐̔͂́̋̔̓̽̒͘͜͠͝͝f̷̡̠̟̼̠̪̼̈̽̓̕f̶̨̢̥͙͔̻͔̗̟͚̝̗̝̗͕͖̣͈̯̥͚̼̳͍̖̘͇̗̠̻̲̠̞̭̼̪̭̭̼̘̜̰̹̩̲̌̿̈̾͂̒͋̈́͑͆̈̌̈́̈̃́́̿́͊̂̽͘̚͘̚͝ͅͅf̸̧̨̡̡̨͓̣͚̙̜̣̩͔͉̟̫̰̰̪̲̪͓͙̱̮̤͉̻̠̞͓̣̤͚̗̻̪̝͎̦̫̲̖͍̓̎̔̏͑̊̄̔̍̾͑̈̅͆̓̓̍̓̾̋̈́̅̊̈́̏̕̕̕͘̕͜͝ͅf̶̢̨̞̹̦͓̘̤̭̠̙̳͎͖͙͖̥́̃̀̓̑̿̄̅̄̅̃͛̋͊̿̓̀͆̇̈̍͐̋̌͌̊̉̽͛́̓̋̉͒̊̍̒̏̎̕͘̚f̴̧̢̡̨̡̛͇͓̖̫̦̭̣̬͉̰̣̞̳̳̘̜̺̦̹̙̻̯͓͇͉̜͈̭̳̮͚̘̳̪̬̱̃̐̈́̀͑͊̄̊̍́̎̔͘̚͜͝͝f̵̨̨̠̦̬͙̥̱͖̲͚̝̭̲̳̘̗̱͚̮̬̪̰̳͉̦̱̟͖̿̋͑̈̒̂̃͊̈̃͋̕͘͜͝͝f̷̡̡̛̛͇̫͇̼̭̗̪̮̲̤̮̙̲͑̈́́̂̄̅̊͒̽̽͛͐́̇́̀͂̓̆̉͂̒̏͆͋͂͛̂̒́̇͘̚̚̚̕͘̚͘͝͝͠͠f̶̧̡̨̡̨̛̥̜̰̬͎̩̺͍͖̰̻̹̗̗̼̻̪̺̰̘̬̺̦̝̠͉̻̫͙̻̺̘̥͓̖̐͊̿̿̄̀̄̓͘͜͜͝f̵̨͍̠̼͚̹̣̝͓̗̻̲̰͖̜̿̅̅͐̄͛̆̆̊͊̂̃͛̽̋̋̊͐̽̑͒̄̏̔̓̽̔̔̄̐̓̍͘̚̕̚͘͝f̴̧̛̙̹̼̻͙̩̥̣͍̺̦̩͇̭̼͇̼̪̙͚̹̪̤̓̆̂͂̎͗́͗̇́̓̆͒̓͒̿͑̀̽̈́̿̆́͂̈́̃̓̐̉̈́̐͒̀̚̚͜ͅͅf̶̧̧̡̨̨̨̛̪̞̮͎̥̞̤̪̙̭̗̞̲͉̖̲̬̪̦̳͉̗̺̬̼̝̭̭͔̆̿͗̊̈͑̃̋̈̆́̿̆̋̄̈̍̈́͂̍́̓̈́̽̈́̍̈͌͂̍̈́̅̈͑̓͆̓͌́͋͐̽͘͘̚͜f̷̡̛̛͔͇̪͈͎̱̙̰͊̈̄͐̋͒͛̈́̓̆̅̃͂̍̆̉̐̃̀̑̐̽̉̀͝f̶̢̧̛̛̛̖̱̭̗͓̼̼̙̤̱̬̦̲̗̭̓̇̊̔̉̉͐̿͒̈́̇̆̍̀̿̅́͌̔̀̿̔͆̄͆͂͋͗̿͂̽̃̊̓̽̿̕͠͠͠͝ (0,4,0)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
2. It will damage the data on the computer and infect other programs as well. (5)
4. Short form for malicious software. (7)
5. Old versions of software could be ______ to virus attacks. (5)
7. Hackers may use security __________ in the older versions of operating systems to damage our devices. (9)
10. Victims are told a convincing story and persuaded to provide their personal information or to transfer their money. (10)
13. It takes place when an Internet user is threatened, harassed, or embarrassed by another Internet user. (13)
15. ________ engineering means manipulating other people in order to gain confidential information from the victims. (6)
16. This was hacked lollllllllllllf̶̨̢̛̛͖̪͚̰̫̥̣͈͉̻̙̹̗̫͎̬͕̬̪͇̘̣̺̤̰̘̜̻̩̯̤͓̪͕̫͇̩̐̒̈͌͊͆͐͋̂͑͂̏́̈̀̽̈́͐͊͑̇͑̅͌̈̓̒͗͆̎̾͑̓̐̆̓͐̕̕͘͘͜͜͝f̷̡̢̨̝̯̱̪̜̰͍̻͚̙͓͇̞͙̪̱͇̭͎̟̱̬͇̼̩̺̺̱̻̼̿̎͛͗̇͐͘͜͠ͅf̵̨̢̛̛̟̼̝͖̮̺̠͔̳̾͂̇͐̌̅͒̑͛̋̋̀͐̂̅̀̓́͛̃̄̈̕͜͝͝f̴̧̛̛͚̙͖̥̼̼̙̻̺̙͎̃̈́̓̓͌͗͌̈́́̎̈́̀̈́̋̑̀̀̄̒̽͌͘͠͝f̸̢̧̻̰͖̘̯͚̺͍̖͓͕͉̹͙̞̗̟̭̍́́̈̂̽̇̊̓͊̎̆̆̐̿̂͗̽̈̒͆̀͋̾̓̚ͅf̷̛̼͔͔͚̙̣̳̜̬̠̭̝͎̥̆̃̊͌̒̇͗̆̈́͌̉̒̐͗̈́̈́̆̆̃͒̈͋̂̍̔̀́̚̕͘͜͠f̸̛͎͓͕̞̲͉̝͔̻̅̆̍̇̄̀͠ͅͅf̸̢̧͍̯̝͕̺̰̘̦̹̳̱̜̣̮̱̳̤̬̞͎̬̰̓͆̿̓̓́́̽̒̍̀̓̿̂̇́͗̇̑͘f̸̧̞̦̣̟̩̦͎̩͔̭͚̹̹̗̦̙͍̼͋̈́̎͂̆̈́̔̇̈̌́́̓̐̇̃͊̌͗̓̾͊͌͘f̵̡̨̢̢̨̡̛̛̼̤͙̜͖͈̪͍͇̠̻̦̻̥̫͇̜̣͚̘̦̫̱͖͉̭̗̭̫̯̻̳͔̤͔͍̤̽̈́̈́̽͆̓̀̅͐̍̍̇̎̽̆͋̈́̈̓͂̉̎̈͛̽̕̕͜͜͝͝ͅf̶̨͔̫̪̭̼̮̘̞̙̯̜̹̋̓̓̾́̑̅̇̈́͂̆̓͆̀̅̋̀̉̉̆̃͌̅͊̌̈́̇̆͗́͂̃̍͆͘̕͘̕͘͜͠͠͝͠͝͝͝͠͝f̸̢̛̺̰̟͓̙̗͙̮̩̃̊͛̃͋̎͗́̓̂͛͂̇͑͆͊͑͌͗̆̽̽̐̈́̽̅͌̏̚͘f̸̧͓̺̘͉̼̺͕͈̯̖̫͓̩͗̿̀f̸̢͍̫̳̲̟͎̫͓͙͙̰͍̬̪͇͛̓̀̈́̃̌̈́̃͐͊̅̐̔͂́̋̔̓̽̒͘͜͠͝͝f̷̡̠̟̼̠̪̼̈̽̓̕f̶̨̢̥͙͔̻͔̗̟͚̝̗̝̗͕͖̣͈̯̥͚̼̳͍̖̘͇̗̠̻̲̠̞̭̼̪̭̭̼̘̜̰̹̩̲̌̿̈̾͂̒͋̈́͑͆̈̌̈́̈̃́́̿́͊̂̽͘̚͘̚͝ͅͅf̸̧̨̡̡̨͓̣͚̙̜̣̩͔͉̟̫̰̰̪̲̪͓͙̱̮̤͉̻̠̞͓̣̤͚̗̻̪̝͎̦̫̲̖͍̓̎̔̏͑̊̄̔̍̾͑̈̅͆̓̓̍̓̾̋̈́̅̊̈́̏̕̕̕͘̕͜͝ͅf̶̢̨̞̹̦͓̘̤̭̠̙̳͎͖͙͖̥́̃̀̓̑̿̄̅̄̅̃͛̋͊̿̓̀͆̇̈̍͐̋̌͌̊̉̽͛́̓̋̉͒̊̍̒̏̎̕͘̚f̴̧̢̡̨̡̛͇͓̖̫̦̭̣̬͉̰̣̞̳̳̘̜̺̦̹̙̻̯͓͇͉̜͈̭̳̮͚̘̳̪̬̱̃̐̈́̀͑͊̄̊̍́̎̔͘̚͜͝͝f̵̨̨̠̦̬͙̥̱͖̲͚̝̭̲̳̘̗̱͚̮̬̪̰̳͉̦̱̟͖̿̋͑̈̒̂̃͊̈̃͋̕͘͜͝͝f̷̡̡̛̛͇̫͇̼̭̗̪̮̲̤̮̙̲͑̈́́̂̄̅̊͒̽̽͛͐́̇́̀͂̓̆̉͂̒̏͆͋͂͛̂̒́̇͘̚̚̚̕͘̚͘͝͝͠͠f̶̧̡̨̡̨̛̥̜̰̬͎̩̺͍͖̰̻̹̗̗̼̻̪̺̰̘̬̺̦̝̠͉̻̫͙̻̺̘̥͓̖̐͊̿̿̄̀̄̓͘͜͜͝f̵̨͍̠̼͚̹̣̝͓̗̻̲̰͖̜̿̅̅͐̄͛̆̆̊͊̂̃͛̽̋̋̊͐̽̑͒̄̏̔̓̽̔̔̄̐̓̍͘̚̕̚͘͝f̴̧̛̙̹̼̻͙̩̥̣͍̺̦̩͇̭̼͇̼̪̙͚̹̪̤̓̆̂͂̎͗́͗̇́̓̆͒̓͒̿͑̀̽̈́̿̆́͂̈́̃̓̐̉̈́̐͒̀̚̚͜ͅͅf̶̧̧̡̨̨̨̛̪̞̮͎̥̞̤̪̙̭̗̞̲͉̖̲̬̪̦̳͉̗̺̬̼̝̭̭͔̆̿͗̊̈͑̃̋̈̆́̿̆̋̄̈̍̈́͂̍́̓̈́̽̈́̍̈͌͂̍̈́̅̈͑̓͆̓͌́͋͐̽͘͘̚͜f̷̡̛̛͔͇̪͈͎̱̙̰͊̈̄͐̋͒͛̈́̓̆̅̃͂̍̆̉̐̃̀̑̐̽̉̀͝f̶̢̧̛̛̛̖̱̭̗͓̼̼̙̤̱̬̦̲̗̭̓̇̊̔̉̉͐̿͒̈́̇̆̍̀̿̅́͌̔̀̿̔͆̄͆͂͋͗̿͂̽̃̊̓̽̿̕͠͠͠͝ (0,4,0)
17. Anti-virus software scans running applications so viruses can be _______ and removed immediately. (8)
DOWN
1. A software or hardware device that can monitor and control network traffic. (8)
3. Trojan hourse allows the _______ to infiltrate the computer system. (6)
6. Most __________ systems nowadays include firewall software. (9)
8. A malware that can replicate themselves and spread through computer networks automatically. (4)
9. A set of conventions governing people's behaviour in an online environment. (10)
11. Unlike computer viruses, Trojan horses do not ________ themselves. (9)
12. Turn on the auto-update function of anti-virus software to update the virus __________. (9)
14. This was hacked lollllllllllllf̶̨̢̛̛͖̪͚̰̫̥̣͈͉̻̙̹̗̫͎̬͕̬̪͇̘̣̺̤̰̘̜̻̩̯̤͓̪͕̫͇̩̐̒̈͌͊͆͐͋̂͑͂̏́̈̀̽̈́͐͊͑̇͑̅͌̈̓̒͗͆̎̾͑̓̐̆̓͐̕̕͘͘͜͜͝f̷̡̢̨̝̯̱̪̜̰͍̻͚̙͓͇̞͙̪̱͇̭͎̟̱̬͇̼̩̺̺̱̻̼̿̎͛͗̇͐͘͜͠ͅf̵̨̢̛̛̟̼̝͖̮̺̠͔̳̾͂̇͐̌̅͒̑͛̋̋̀͐̂̅̀̓́͛̃̄̈̕͜͝͝f̴̧̛̛͚̙͖̥̼̼̙̻̺̙͎̃̈́̓̓͌͗͌̈́́̎̈́̀̈́̋̑̀̀̄̒̽͌͘͠͝f̸̢̧̻̰͖̘̯͚̺͍̖͓͕͉̹͙̞̗̟̭̍́́̈̂̽̇̊̓͊̎̆̆̐̿̂͗̽̈̒͆̀͋̾̓̚ͅf̷̛̼͔͔͚̙̣̳̜̬̠̭̝͎̥̆̃̊͌̒̇͗̆̈́͌̉̒̐͗̈́̈́̆̆̃͒̈͋̂̍̔̀́̚̕͘͜͠f̸̛͎͓͕̞̲͉̝͔̻̅̆̍̇̄̀͠ͅͅf̸̢̧͍̯̝͕̺̰̘̦̹̳̱̜̣̮̱̳̤̬̞͎̬̰̓͆̿̓̓́́̽̒̍̀̓̿̂̇́͗̇̑͘f̸̧̞̦̣̟̩̦͎̩͔̭͚̹̹̗̦̙͍̼͋̈́̎͂̆̈́̔̇̈̌́́̓̐̇̃͊̌͗̓̾͊͌͘f̵̡̨̢̢̨̡̛̛̼̤͙̜͖͈̪͍͇̠̻̦̻̥̫͇̜̣͚̘̦̫̱͖͉̭̗̭̫̯̻̳͔̤͔͍̤̽̈́̈́̽͆̓̀̅͐̍̍̇̎̽̆͋̈́̈̓͂̉̎̈͛̽̕̕͜͜͝͝ͅf̶̨͔̫̪̭̼̮̘̞̙̯̜̹̋̓̓̾́̑̅̇̈́͂̆̓͆̀̅̋̀̉̉̆̃͌̅͊̌̈́̇̆͗́͂̃̍͆͘̕͘̕͘͜͠͠͝͠͝͝͝͠͝f̸̢̛̺̰̟͓̙̗͙̮̩̃̊͛̃͋̎͗́̓̂͛͂̇͑͆͊͑͌͗̆̽̽̐̈́̽̅͌̏̚͘f̸̧͓̺̘͉̼̺͕͈̯̖̫͓̩͗̿̀f̸̢͍̫̳̲̟͎̫͓͙͙̰͍̬̪͇͛̓̀̈́̃̌̈́̃͐͊̅̐̔͂́̋̔̓̽̒͘͜͠͝͝f̷̡̠̟̼̠̪̼̈̽̓̕f̶̨̢̥͙͔̻͔̗̟͚̝̗̝̗͕͖̣͈̯̥͚̼̳͍̖̘͇̗̠̻̲̠̞̭̼̪̭̭̼̘̜̰̹̩̲̌̿̈̾͂̒͋̈́͑͆̈̌̈́̈̃́́̿́͊̂̽͘̚͘̚͝ͅͅf̸̧̨̡̡̨͓̣͚̙̜̣̩͔͉̟̫̰̰̪̲̪͓͙̱̮̤͉̻̠̞͓̣̤͚̗̻̪̝͎̦̫̲̖͍̓̎̔̏͑̊̄̔̍̾͑̈̅͆̓̓̍̓̾̋̈́̅̊̈́̏̕̕̕͘̕͜͝ͅf̶̢̨̞̹̦͓̘̤̭̠̙̳͎͖͙͖̥́̃̀̓̑̿̄̅̄̅̃͛̋͊̿̓̀͆̇̈̍͐̋̌͌̊̉̽͛́̓̋̉͒̊̍̒̏̎̕͘̚f̴̧̢̡̨̡̛͇͓̖̫̦̭̣̬͉̰̣̞̳̳̘̜̺̦̹̙̻̯͓͇͉̜͈̭̳̮͚̘̳̪̬̱̃̐̈́̀͑͊̄̊̍́̎̔͘̚͜͝͝f̵̨̨̠̦̬͙̥̱͖̲͚̝̭̲̳̘̗̱͚̮̬̪̰̳͉̦̱̟͖̿̋͑̈̒̂̃͊̈̃͋̕͘͜͝͝f̷̡̡̛̛͇̫͇̼̭̗̪̮̲̤̮̙̲͑̈́́̂̄̅̊͒̽̽͛͐́̇́̀͂̓̆̉͂̒̏͆͋͂͛̂̒́̇͘̚̚̚̕͘̚͘͝͝͠͠f̶̧̡̨̡̨̛̥̜̰̬͎̩̺͍͖̰̻̹̗̗̼̻̪̺̰̘̬̺̦̝̠͉̻̫͙̻̺̘̥͓̖̐͊̿̿̄̀̄̓͘͜͜͝f̵̨͍̠̼͚̹̣̝͓̗̻̲̰͖̜̿̅̅͐̄͛̆̆̊͊̂̃͛̽̋̋̊͐̽̑͒̄̏̔̓̽̔̔̄̐̓̍͘̚̕̚͘͝f̴̧̛̙̹̼̻͙̩̥̣͍̺̦̩͇̭̼͇̼̪̙͚̹̪̤̓̆̂͂̎͗́͗̇́̓̆͒̓͒̿͑̀̽̈́̿̆́͂̈́̃̓̐̉̈́̐͒̀̚̚͜ͅͅf̶̧̧̡̨̨̨̛̪̞̮͎̥̞̤̪̙̭̗̞̲͉̖̲̬̪̦̳͉̗̺̬̼̝̭̭͔̆̿͗̊̈͑̃̋̈̆́̿̆̋̄̈̍̈́͂̍́̓̈́̽̈́̍̈͌͂̍̈́̅̈͑̓͆̓͌́͋͐̽͘͘̚͜f̷̡̛̛͔͇̪͈͎̱̙̰͊̈̄͐̋͒͛̈́̓̆̅̃͂̍̆̉̐̃̀̑̐̽̉̀͝f̶̢̧̛̛̛̖̱̭̗͓̼̼̙̤̱̬̦̲̗̭̓̇̊̔̉̉͐̿͒̈́̇̆̍̀̿̅́͌̔̀̿̔͆̄͆͂͋͗̿͂̽̃̊̓̽̿̕͠͠͠͝ (0,4,0)

|