CROSSWORD LAB

12345678910111213141516
Across
  1. 3. The database key that uniquely identifies each record.
  2. 6. The phase in SDLC where the system is deployed for real-world use.
  3. 7. A machine learning technique inspired by the human brain.
  4. 10. Model defining seven layers of network communication
  5. 11. The process of verifying a user's identity.
  6. 13. Sorting algorithm with best-case time complexity O(n).
  7. 14. A security technique involving hiding data within other data (e.g., images).
  8. 15. A data structure organized as LIFO (Last In, First Out).
  9. 16. The network device that connects multiple networks and directs data packets.
Down
  1. 1. Java feature allowing a subclass to provide specific implementation for a superclass method.
  2. 2. Memory management technique dividing memory into equal-sized blocks.
  3. 4. A collection of interrelated tables in a database.
  4. 5. Protocol used for transferring files securely over a network
  5. 8. The main memory of the computer, also known as volatile memory.
  6. 9. Algorithm that finds the shortest path between nodes in a graph.
  7. 11. A system program that translates assembly language into machine code.
  8. 12. Type of malware that replicates itself and spreads to other computers.