|
"Module 5 Vocabulary 2": HTML5 Crossword |
Across3. a hardware or software that protects a network's resources from intrusion by users on another network (8)
4. a unique combination of characters that identifies a specific user/ (4,4)
5. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network (4,4)
8. users provide the software product's identification number to associate the software with the computer or mobile device on which the software is installed (17)
10. occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program (13)
11. numeric password, either assigned by a company or selected by a user (3,0)
13. the right to use software (7,9)
14. a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network (8)
15. process of converting readable data into unreadable characters to prevent unauthorized access (0,10)
|
|
Down1. the unauthorized and illegal duplication of copyrighted software (8,6)
2. authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic (15)
6. An assault whose purpose is to disrupt computer access to an Internet service such as the web or email (9)
7. software that detects and protects a personal computer and its data from unauthorized intrusions (0,16)
9. the discovery, collection, and analysis of evidence found on computers and networks (7,9)
12. private combination of characters associated with a user name that allows access to certain computer resources (8)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
3. a hardware or software that protects a network's resources from intrusion by users on another network (8)
4. a unique combination of characters that identifies a specific user/ (4,4)
5. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network (4,4)
8. users provide the software product's identification number to associate the software with the computer or mobile device on which the software is installed (17)
10. occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program (13)
11. numeric password, either assigned by a company or selected by a user (3,0)
13. the right to use software (7,9)
14. a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network (8)
15. process of converting readable data into unreadable characters to prevent unauthorized access (0,10)
DOWN
1. the unauthorized and illegal duplication of copyrighted software (8,6)
2. authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic (15)
6. An assault whose purpose is to disrupt computer access to an Internet service such as the web or email (9)
7. software that detects and protects a personal computer and its data from unauthorized intrusions (0,16)
9. the discovery, collection, and analysis of evidence found on computers and networks (7,9)
12. private combination of characters associated with a user name that allows access to certain computer resources (8)

|