CROSSWORD LAB
Across
- 3. The database key that uniquely identifies each record.
- 6. The phase in SDLC where the system is deployed for real-world use.
- 7. A machine learning technique inspired by the human brain.
- 10. Model defining seven layers of network communication
- 11. The process of verifying a user's identity.
- 13. Sorting algorithm with best-case time complexity O(n).
- 14. A security technique involving hiding data within other data (e.g., images).
- 15. A data structure organized as LIFO (Last In, First Out).
- 16. The network device that connects multiple networks and directs data packets.
Down
- 1. Java feature allowing a subclass to provide specific implementation for a superclass method.
- 2. Memory management technique dividing memory into equal-sized blocks.
- 4. A collection of interrelated tables in a database.
- 5. Protocol used for transferring files securely over a network
- 8. The main memory of the computer, also known as volatile memory.
- 9. Algorithm that finds the shortest path between nodes in a graph.
- 11. A system program that translates assembly language into machine code.
- 12. Type of malware that replicates itself and spreads to other computers.