This printable crossword puzzle on the topic of Computer Science & Technology has 21 clues. Answers range from 3 to 19 letters long. This crossword is also available to download as a Microsoft Word document or a PDF.
does not eliminate servers
a small program that allows a peripheral device such as a printer or scanner to connect to your PC
to load and initialise the operating system on a computer
a wireless communications technology intended to replace cables
Translating a source program into a machine language
Number system used by computers. Uses sixteen digits
Code used for representing characters in the computer
approval, permission, or empowerment for someone or something to do something
type of input validation attack where SQL code is inserted into application queries to manipulate the database
pseudo IP address that always refer back to the local host and never sent out to a network
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers
protocol used for sending e‑mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one‑by‑one
e‑mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
encrypted form of the message being sent
hidden, self‑replicating section of computer software that inserts itself and becomes part of the another program
security identification device like facial recognition and fingerprints
the process of uncovering and interpreting electronic data while trying to preserve any evidence in its most original form
A version of the software development life cycle (SDLC) consisting of six phases in which the results of each phase flow down to the next
What is a network security system used to stop unauthorised access called?