PREMIUM LOGIN

ClassTools Premium membership gives access to all templates, no advertisements, personal branding and many other benefits!
 

Username:    
Password:    
Submit Cancel

 

Not a member?

JOIN NOW!

 
                                       
           
                                     
             
                                     
                       
                                   
             
                                   
                                   
                       
                                     
                                     
         
                                   
                   
                                   
                                 
       
                                 
                                   
                   
                                     
                                       

"Module 5 Vocabulary 2": HTML5 Crossword

Across

2. authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic (15)
4. occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program (13)
5. a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network (8)
7. the unauthorized and illegal duplication of copyrighted software (8,6)
8. a hardware or software that protects a network's resources from intrusion by users on another network (8)
9. software that detects and protects a personal computer and its data from unauthorized intrusions (0,16)
11. An assault whose purpose is to disrupt computer access to an Internet service such as the web or email (9)
14. the discovery, collection, and analysis of evidence found on computers and networks (7,9)
15. process of converting readable data into unreadable characters to prevent unauthorized access (0,10)

Down

1. the right to use software (7,9)
3. a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network (4,4)
6. users provide the software product's identification number to associate the software with the computer or mobile device on which the software is installed (17)
10. a unique combination of characters that identifies a specific user/ (4,4)
12. private combination of characters associated with a user name that allows access to certain computer resources (8)
13. numeric password, either assigned by a company or selected by a user (3,0)

new edit share pdf:puzzle pdf:answers Create an editable copy