CompSci

1234567891011121314151617181920
Across
  1. 2. is firmware that initializes hardware and starts the operating system when you power on your computer.
  2. 4. is a unit of frequency, representing one billion cycles per second.
  3. 10. is software that manages a computer's hardware and software resources, providing a platform for applications to run.
  4. 12. refers to the delay or time it takes for data to travel from one point to another in a system, such as in computing or networking.
  5. 14. is a device that absorbs and dissipates heat from components like CPUs or GPUs to prevent overheating.
  6. 15. is malicious software designed to harm, disrupt, or exploit devices, networks, or systems.
  7. 19. is a specialized processor designed to handle complex visual and parallel computing tasks, such as rendering graphics and processing large datasets quickly.
Down
  1. 1. is the main circuit board of a computer, connecting all its components like the CPU, RAM, GPU, storage, and peripherals.
  2. 3. is a storage device that uses flash memory instead of moving parts like traditional hard drives.
  3. 5. is your computer's short-term memory, storing data that's actively being used or processed.
  4. 6. is a tiny electronic switch or amplifier that controls the flow of electrical current in circuits. It's a fundamental building block of modern electronics.
  5. 7. is a type of spyware that records every keystroke you type, often without your knowledge.
  6. 8. is a storage device that holds data permanently, including files, applications, and the operating system.
  7. 9. reads and writes data using lasers on discs like CDs, DVDs, or Blu-rays. It's used for storing, accessing, or transferring media and files.
  8. 11. is a small, high-speed storage layer that temporarily holds frequently accessed data to improve performance.
  9. 13. is a type of malware that locks or encrypts your data, demanding payment to restore access.
  10. 16. is the rate at which a CPU performs operations, measured in Gigahertz.
  11. 17. is a cyber-attack where scammers trick people into revealing sensitive information, such as passwords or financial details, by posing as trustworthy entities.
  12. 18. is a universal coding standard that assigns a unique number to every character, symbol, or script, enabling consistent text representation across different platforms and languages.
  13. 20. is the core of a computer where most processing happens.