PREMIUM LOGIN

ClassTools Premium membership gives access to all templates, no advertisements, personal branding and many other benefits!
 

Username:    
Password:    
Submit Cancel

 

Not a member?

JOIN NOW!

 
                                                     
                                                   
                                                   
                                                   
                                                 
                                               
                                               
                                               
                                               
                                             
                                             
                     
                                             
                                 
                                                   
                                                   
                                               
                                               
                       
                                               
                                               
                                               
               
                                               
                                   
                                                   
                                       
                                                     

"Module 5 Vocabulary 2": HTML5 Crossword

Across

6. the right to use software (7,9)
8. a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network (8)
11. the discovery, collection, and analysis of evidence found on computers and networks (7,9)
13. users provide the software product's identification number to associate the software with the computer or mobile device on which the software is installed (17)
14. An assault whose purpose is to disrupt computer access to an Internet service such as the web or email (9)
15. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network (4,4)

Down

1. the unauthorized and illegal duplication of copyrighted software (8,6)
2. occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program (13)
3. a unique combination of characters that identifies a specific user/ (4,4)
4. a hardware or software that protects a network's resources from intrusion by users on another network (8)
5. software that detects and protects a personal computer and its data from unauthorized intrusions (0,16)
7. authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic (15)
9. numeric password, either assigned by a company or selected by a user (3,0)
10. private combination of characters associated with a user name that allows access to certain computer resources (8)
12. process of converting readable data into unreadable characters to prevent unauthorized access (0,10)

new edit share pdf:puzzle pdf:answers Create an editable copy