fu

12345678910111213141516171819202122232425
Across
  1. 5. A set of rules governing communication between computers on a network.
  2. 6. A collection of data stored on a computer.
  3. 7. The person or entity using a computer or system.
  4. 8. A type of malware that disguises itself as legitimate software.
  5. 10. Malicious software designed to harm a computer system.
  6. 12. A unit of digital information, typically 8 bits.
  7. 14. A series of commands that are executed by a program.
  8. 17. A peripheral device used to input text and commands into a computer.
  9. 21. SOURCE Software whose source code is available for modification.
  10. 22. A computer that provides services or resources to other computers on a network.
  11. 23. A group of interconnected computers that can share resources.
  12. 25. A markup language used to store and transport data.
Down
  1. 1. The process of encoding information to prevent unauthorized access.
  2. 2. Malicious code that can replicate itself and spread to other systems.
  3. 3. A program that executes instructions written in a programming language line by line.
  4. 4. A computer or device on a network that provides services to other devices.
  5. 9. A high-level, object-oriented programming language.
  6. 11. A system of interlinked hypertext documents accessed through the internet.
  7. 13. A version control system commonly used in software development.
  8. 15. A small, fast memory storage used to store frequently accessed data.
  9. 16. To identify and fix errors or bugs in a program.
  10. 18. An ordered set of instructions to perform a task.
  11. 19. Local Area Network, a network of computers in a limited geographical area.
  12. 20. A request for information from a database.
  13. 24. Random Access Memory, temporary data storage for active processes.