1102N Activity

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 7. Software embedded into hardware devices, providing low-level control for the specific hardware.
  2. 8. Software that connects different software components or applications.
  3. 10. Easily transportable or transferable.
  4. 11. Software designed for a specific task or function.
  5. 13. Volatile memory used by a computer to store and quickly retrieve data.
  6. 16. Software that manages computer hardware and provides common services for computer programs.
  7. 17. Application for organizing and analyzing data in tabular form.
  8. 20. Hardware devices that allow users to input data.
  9. 21. Physical components of a computer system.
  10. 22. An open-source file archiver with a high compression ratio, capable of handling multiple formats, including 7z, ZIP, and TAR.
  11. 24. Online storage services that allow users to store and access data over the internet.
  12. 25. Software that allows the operating system to communicate with and control a hardware device.
  13. 26. A file format used for presenting documents independent of the software, hardware, and operating systems.
  14. 28. A leading software company known for creative applications.
  15. 31. Services for storing, syncing, and sharing files across devices and users.
  16. 33. Utility for managing and monitoring running processes.
  17. 35. Utility for removing unnecessary files from a computer's hard drive.
  18. 37. Software that establishes a secure, encrypted connection over a less secure network, such as the internet.
  19. 39. System software designed to help manage and tune computer hardware, software, or an operating system.
  20. 40. Software for accessing information on the World Wide Web.
Down
  1. 1. The process of converting encrypted data back to its original form.
  2. 2. Malicious software designed to harm or exploit computers.
  3. 3. A set of rules or steps for solving a particular problem or accomplishing a specific task.
  4. 4. Security software that monitors and controls incoming and outgoing network traffic based on predetermined security
  5. 5. A visual interface allowing users to interact with electronic devices through graphical elements.
  6. 6. Application for accessing information on the World Wide Web.
  7. 9. Software for storing, organizing, and retrieving data.
  8. 12. Software for scheduling and organizing events, appointments, and reminders.
  9. 14. Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
  10. 15. a standard interface for connecting and transferring data between electronic devices.
  11. 18. Hardware devices that display or output data
  12. 19. Identifying and alerting users about potential security risks.
  13. 23. External device connected to a computer
  14. 27. Programs that encode data to prevent unauthorized access.
  15. 29. Software for creating copies of files to prevent data loss.
  16. 30. Applications that facilitate teamwork and communication among users, often including features like document sharing.
  17. 32. Wide Area Network covers a broad area, often connecting multiple LANs.
  18. 34. Temporary storage area that holds frequently accessed data for quicker retrieval.
  19. 36. Local Area Network connects computers and devices in a limited geographical area.
  20. 38. File compression format and utility.