Computer Science

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 2. A technique used to map data to fixed-size values for quick retrieval, often used in hash tables.
  2. 7. A set of rules governing how data is transmitted between devices in a network.
  3. 8. A signal that temporarily halts the CPU to allow immediate processing of a high-priority task.
  4. 10. The ability of different classes to use the same method name but with different implementations.
  5. 11. A system that translates domain names (like google.com) into IP addresses.
  6. 14. A small, high-speed memory area that stores frequently accessed data for faster processing.
  7. 15. A problem-solving algorithm that tries partial solutions and undoes them when necessary.
  8. 16. A four-layer model used to structure network communications.
  9. 18. A number system using only 0s and 1s, fundamental to computer operations.
  10. 20. The practice of hiding implementation details and showing only essential features.
  11. 21. The object-oriented programming principle that hides data inside a class and only allows controlled access.
  12. 24. The process of repeatedly executing a set of instructions using loops.
  13. 25. A base-16 number system used to simplify binary representation.
  14. 27. A data structure that follows the Last In, First Out (LIFO) principle.
  15. 28. A CPU design technique where multiple instructions are processed simultaneously at different stages.
  16. 29. A data structure that follows the First In, First Out (FIFO) principle.
  17. 30. The part of a machine instruction that specifies the operation to be performed.
  18. 32. The fundamental protocol suite that enables communication over the internet.
  19. 35. A technique where a computer uses secondary storage (e.g., a hard drive) to extend RAM.
  20. 36. The latest version of the Internet Protocol, designed to provide more IP addresses.
  21. 38. A device that directs data packets between different networks.
  22. 39. A logical subdivision of a network that improves security and efficiency.
Down
  1. 1. A method for representing real numbers in a way that supports fractions and large values.
  2. 3. A computer architecture that separates memory for data and instructions, allowing simultaneous access.
  3. 4. A method of data transmission where messages are broken into smaller units and reassembled at their destination.
  4. 5. A field in one database table that links to the primary key of another table.
  5. 6. The process of organising a database to reduce redundancy and improve integrity.
  6. 9. A computer architecture where programs and data share the same memory.
  7. 12. A notation used to describe the efficiency of an algorithm in terms of time or space complexity.
  8. 13. A small, fast memory location within the CPU that stores temporary data and instructions.
  9. 17. A computing technique that divides tasks into smaller parts and processes them simultaneously.
  10. 19. The maximum data transfer rate of a network connection, usually measured in bits per second (bps).
  11. 22. A divide-and-conquer sorting algorithm that splits an array into smaller parts and then merges them in order.
  12. 23. A character encoding standard that supports multiple languages and symbols.
  13. 26. The structured query language used to manage and manipulate relational databases.
  14. 31. A data structure made up of nodes, where each node contains data and a reference to the next node.
  15. 33. A unique identifier for a record in a database table.
  16. 34. A security system that monitors and controls incoming and outgoing network traffic.
  17. 37. A function that calls itself within its definition.