CW-2
Across
- 3. a term for a software application that allows users to access and navigate the WWW to view websites and web pages
- 5. in cybersecurity, what is the practice of disguising data or communication to make it look like something else called
- 7. what do you type into a web browser to visit a websit
- 8. a term for a computer program or hardware device that provides a specific service or functionality to other software applications
- 9. in linux, what cmd is used to change the ownership of files and directories
Down
- 1. the core component of an operating system that manages hardware resources
- 2. a data structure which follows the "First-In, First-Out" (FIFO) principle, where the element that has been in the queue the longest is the first to be removed
- 4. in a relational database, what type of key is used to establish a link between two tables, ensuring referential integrity by enforcing relationships between records in different tables
- 6. which cmd is used to display the contents of a text file in the terminal
- 8. a collection of elements where the last element added is the first one to be removed (Last-In, First-Out)