|
"Module 5 Vocabulary 2": HTML5 Crossword |
Across2. authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic (15)
4. occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program (13)
5. a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network (8)
7. the unauthorized and illegal duplication of copyrighted software (8,6)
8. a hardware or software that protects a network's resources from intrusion by users on another network (8)
9. software that detects and protects a personal computer and its data from unauthorized intrusions (0,16)
11. An assault whose purpose is to disrupt computer access to an Internet service such as the web or email (9)
14. the discovery, collection, and analysis of evidence found on computers and networks (7,9)
15. process of converting readable data into unreadable characters to prevent unauthorized access (0,10)
|
|
Down1. the right to use software (7,9)
3. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network (4,4)
6. users provide the software product's identification number to associate the software with the computer or mobile device on which the software is installed (17)
10. a unique combination of characters that identifies a specific user/ (4,4)
12. private combination of characters associated with a user name that allows access to certain computer resources (8)
13. numeric password, either assigned by a company or selected by a user (3,0)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
2. authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic (15)
4. occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program (13)
5. a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network (8)
7. the unauthorized and illegal duplication of copyrighted software (8,6)
8. a hardware or software that protects a network's resources from intrusion by users on another network (8)
9. software that detects and protects a personal computer and its data from unauthorized intrusions (0,16)
11. An assault whose purpose is to disrupt computer access to an Internet service such as the web or email (9)
14. the discovery, collection, and analysis of evidence found on computers and networks (7,9)
15. process of converting readable data into unreadable characters to prevent unauthorized access (0,10)
DOWN
1. the right to use software (7,9)
3. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network (4,4)
6. users provide the software product's identification number to associate the software with the computer or mobile device on which the software is installed (17)
10. a unique combination of characters that identifies a specific user/ (4,4)
12. private combination of characters associated with a user name that allows access to certain computer resources (8)
13. numeric password, either assigned by a company or selected by a user (3,0)

|