IST Final Crosswords Part 2

123456789101112131415161718192021222324252627
Across
  1. 4. Lightweight virtualization that packages applications with their dependencies
  2. 5. Compact expansion slot often used for SSDs and WiFi modules
  3. 7. Firmware that initializes hardware before the OS loads
  4. 8. Delay experienced during data transmission
  5. 10. Internet addressing system using 128 bits
  6. 12. Modern firmware interface replacing BIOS with enhanced features
  7. 14. Malware disguised as legitimate software
  8. 17. Integrated circuits on the motherboard that manage communication between CPU RAM and peripherals
  9. 20. Background process running continuously in an operating system
  10. 21. High speed storage interface standard for SSDs
  11. 22. Text based interface for interacting with an operating system
  12. 24. Set of rules governing data communication between devices
  13. 25. Small unit of data transmitted over a network
  14. 26. Device that connects devices in a LAN and forwards data based on MAC addresses
  15. 27. Processor designed for rendering graphics and parallel computations
Down
  1. 1. Saved state of a virtual machine at a point in time
  2. 2. Self replicating malware spreading through networks
  3. 3. Security system controlling incoming and outgoing network traffic
  4. 6. System that translates domain names into IP addresses
  5. 7. Maximum amount of data that can travel through a communication channel
  6. 9. Basic networking device that broadcasts data to all connected devices
  7. 11. Secure communication tunnel over the Internet
  8. 13. Device that forwards data packets between networks
  9. 15. Device that performs physical actions in response to control signals
  10. 16. Device that converts real world data into electrical signals
  11. 18. Internet addressing system using 32 bits
  12. 19. Program that interprets and executes user commands
  13. 22. Number of cycles per second executed by the CPU measured in GHz
  14. 23. Network of physical devices connected to the Internet
  15. 25. Cyberattack where attackers trick users into revealing sensitive information