24
Across
- 3. Speeds up access
- 5. Retrieve data
- 7. Restore settings
- 9. Mediates connections
- 10. Temporary data storage
- 12. Harmful software
- 14. Blocks access for ransom
- 15. Interpret data
- 17. Prepare storage device
- 19. Malicious code
- 24. System failure
- 25. Secure data
Down
- 1. Convert data
- 2. Exchange data
- 4. Restart system
- 6. Disguised malware
- 8. Secretly gathers data
- 11. Blocks unauthorized access
- 13. Fix errors
- 16. Reduce file size
- 18. Unlock data
- 20. Transmit data continuously
- 21. Synchronize data
- 22. Divide storage
- 23. Deceptive data gathering