IT-Terms
Across
- 2. A security device that monitors and controls the traffic between a network or computer system and the internet to block unwanted access or threats.
- 4. Software that manages computer hardware and provides common services and functions for other software applications, such as Windows, macOS, and Linux.
- 7. (Random Access Memory) A type of computer memory that allows data to be accessed randomly, typically used to temporarily store data and instructions for processing.
- 9. A set of instructions or rules used to solve a specific problem or perform a particular task, especially in computer science.
- 10. A computer or system that provides services or resources to other computers or devices on a network, such as files, printers, or applications.
- 11. The process of converting data into a form that is unreadable to unauthorized users to ensure the security and confidentiality of information.
Down
- 1. Malicious software designed to damage, steal, or manipulate computers, networks, or data, often without the knowledge or consent of the user.
- 3. A widely used technology for wired networks that enables the transmission of data across a local area network (LAN) by defining a standardized set of rules for data communication.
- 5. Programs and applications that run on a computer or other electronic device to perform specific tasks or provide functions.
- 6. A structured collection of data that is organized in a way that allows for easy retrieval, manipulation, and management.
- 8. An application software used to display and browse web pages on the internet by interpreting and rendering HTML documents.
- 12. (Central Processing Unit) The primary component of a computer that performs instructions and processes data to execute programs.