Information and Communication Technology
Across
- 3. - The practice of protecting computer systems and networks from digital attacks.
- 5. - A security system that monitors and controls incoming and outgoing network traffic.
- 7. - Programs and applications that run on a computer or mobile device.
- 8. - Software designed to harm computer systems or steal data.
- 9. system - The software that manages a computer's basic functions, such as memory and file systems.
- 11. computing - A model for delivering computing resources over the internet.
- 12. - An input device used for moving the cursor on a computer screen.
- 15. - A device used for processing data and running programs.
- 18. - The process of designing and writing code for software applications.
- 19. - An output device that prints text and images on paper.
Down
- 1. - An input device used for typing text and commands.
- 2. - A type of malicious software that can damage or disrupt computer systems.
- 4. - A structured collection of data that is stored and organized in a computer.
- 6. - A global network of interconnected computer networks.
- 10. - A device that connects multiple devices to a network and directs traffic between them.
- 12. - A device that connects a computer to the internet.
- 13. - The process of converting data into a code to prevent unauthorized access.
- 14. - The physical components of a computer system, such as the CPU, hard drive, and motherboard.
- 16. - A step-by-step procedure for solving a problem or accomplishing a task.
- 17. - An output device that displays images and text.