IT-Terms

123456789101112
Across
  1. 2. A security device that monitors and controls the traffic between a network or computer system and the internet to block unwanted access or threats.
  2. 4. Software that manages computer hardware and provides common services and functions for other software applications, such as Windows, macOS, and Linux.
  3. 7. (Random Access Memory) A type of computer memory that allows data to be accessed randomly, typically used to temporarily store data and instructions for processing.
  4. 9. A set of instructions or rules used to solve a specific problem or perform a particular task, especially in computer science.
  5. 10. A computer or system that provides services or resources to other computers or devices on a network, such as files, printers, or applications.
  6. 11. The process of converting data into a form that is unreadable to unauthorized users to ensure the security and confidentiality of information.
Down
  1. 1. Malicious software designed to damage, steal, or manipulate computers, networks, or data, often without the knowledge or consent of the user.
  2. 3. A widely used technology for wired networks that enables the transmission of data across a local area network (LAN) by defining a standardized set of rules for data communication.
  3. 5. Programs and applications that run on a computer or other electronic device to perform specific tasks or provide functions.
  4. 6. A structured collection of data that is organized in a way that allows for easy retrieval, manipulation, and management.
  5. 8. An application software used to display and browse web pages on the internet by interpreting and rendering HTML documents.
  6. 12. (Central Processing Unit) The primary component of a computer that performs instructions and processes data to execute programs.