CIS 1102

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 3. Online storage services that allow users to store and access files from anywhere with an internet connection.
  2. 5. A security utility that monitors and controls incoming and outgoing network traffic based on predetermined security rules, preventing unauthorized access.
  3. 8. A utility that allows users to revert the computer's state to a previous point in time, typically used to undo system changes or recover from issues.
  4. 11. Software designed to detect and remove computer viruses
  5. 12. Software monitoring and collecting user information.
  6. 13. A file archive format used on Unix and Linux systems, created using the tar command.
  7. 14. A file compression format and the associated compression utility that provides higher compression ratios than gzip.
  8. 15. The process of restoring a compressed file to its original state, making it usable again.
  9. 19. Example of cloud storage by Google
  10. 20. Example of a spreadsheet software by Microsoft
  11. 22. Software that displays unwanted advertisements on a user's computer, often bundled with legitimate software installations.
  12. 25. A file compression format and the associated file extension (.rar) used by the WinRAR software.
  13. 26. A collection of productivity applications bundled together, typically including word processing, spreadsheet, and presentation software.
  14. 28. A file compression format and the associated compression utility used on Unix and Linux systems.
  15. 30. A value calculated from a data set to verify the integrity of files during compression and decompression processes.
  16. 33. an operating system designed by Microsoft.
  17. 34. The process of retrieving data from a backup or other storage medium after a data loss event.
  18. 38. a panel of keys that operate a computer
  19. 39. Example of a presentation software by Microsoft
  20. 40. The process of removing unnecessary files and temporary data from a computer's storage to free up space and improve performance.
Down
  1. 1. portable document format
  2. 2. Software used for creating, editing, and formatting text documents. Examples include Microsoft Word and Google Docs.
  3. 4. Example of cloud storage by Microsoft
  4. 6. Can exploit vulnerabilities to infect other systems.
  5. 7. Example of a presentation software by Google
  6. 9. The process of reorganizing the data on a storage device to improve efficiency and speed up access times.
  7. 10. Example of calendar app by Microsoft
  8. 16. malicious software
  9. 17. Example of a spreadsheet software by Google
  10. 18. The process of reducing the size of one or more files to save disk space and facilitate faster file transfer.
  11. 21. The software that manages computer hardware and provides services for computer programs.
  12. 23. Example of a word processor software by Google
  13. 24. A compressed archive that is split into smaller parts, often for easier storage on multiple disks or for file sharing.
  14. 27. Applications for scheduling and organizing events, appointments, and tasks.
  15. 29. Microsoft writing app
  16. 31. A type of malware that attaches itself to legitimate programs or files with the intent of spreading and causing damage to the host system.
  17. 32. The process of combining multiple files into a single archive file for easier storage, organization, and sharing.
  18. 35. Example of calendar app by Google
  19. 36. A popular file compression format and the associated file extension (.zip). ZIP archives can contain one or more compressed files or folders.
  20. 37. The process of creating a copy of data to ensure its availability in case the original data is lost, damaged, or corrupted.