CW-2

123456789
Across
  1. 3. a term for a software application that allows users to access and navigate the WWW to view websites and web pages
  2. 5. in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
  3. 7. what do you type into a web browser to visit a websit
  4. 8. a term for a computer program or hardware device that provides a specific service or functionality to other software applications
  5. 9. in linux, what cmd is used to change the ownership of files and directories
Down
  1. 1. the core component of an operating system that manages hardware resources
  2. 2. a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
  3. 4. in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
  4. 6. which cmd is used to display the contents of a text file in the terminal
  5. 8. a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)