it
Across
- 5. Converting data into a secret code to prevent unauthorized access.
- 6. A step-by-step procedure for solving a problem.
- 7. Instructions written in a programming language.
- 8. Local Area Network, a network that connects computers within a limited area.
- 10. Storing and accessing data and programs over the internet instead of a local computer.
- 16. Software that translates high-level programming code into machine-readable code.
- 17. A person who gains unauthorized access to computer systems or networks.
- 19. An operating system developed by Microsoft.
- 20. A secret combination of characters used to authenticate a user's identity.
- 22. Measures taken to protect computer systems and data from unauthorized access or attacks.
- 24. A networking device that forwards data packets between computer networks.
- 26. A software tool used for organizing and analyzing data in rows and columns.
- 29. Malicious software disguised as legitimate software.
- 31. A type of malicious software that can replicate itself and spread to other computers.
- 33. Uniform Resource Locator, the address used to access resources on the internet.
- 36. Wireless Fidelity, a technology that allows devices to connect to the internet wirelessly.
- 38. The process of creating computer programs using programming languages.
- 40. Universal Serial Bus, a common interface for connecting devices to a computer.
Down
- 1. A display device used to view output from a computer.
- 2. An input device used to enter data and commands into a computer.
- 3. A global network of interconnected computers and devices.
- 4. A popular programming language used for developing a wide range of applications.
- 9. Programs and applications that run on a computer system.
- 11. Hypertext Markup Language, the standard language for creating web pages.
- 12. Structured Query Language, a programming language used for managing and manipulating databases.
- 13. Software used to access and view websites on the internet.
- 14. Transmission Control Protocol/Internet Protocol, the basic communication protocol of the internet.
- 15. Malicious software designed to harm or exploit computer systems.
- 18. Creating a copy of data to protect against loss or damage.
- 21. The capacity to hold and retain data or information.
- 23. A network security system that monitors and controls incoming and outgoing network traffic
- 25. development: The process of creating websites and web applications.
- 27. A computer or system that provides resources or services to other computers or clients.
- 28. Virtual Private Network, a secure connection between a user and a private network over the internet.
- 30. system: Software that manages computer hardware and software resources.
- 32. A structured collection of data stored and organized for easy retrieval.
- 34. The process of identifying and fixing errors or bugs in software code.
- 35. A network security system that monitors and controls incoming and outgoing network traffic.
- 37. Extensible Markup Language, a markup language used for storing and transporting data.
- 39. A group of interconnected computers and devices.