it

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 5. Converting data into a secret code to prevent unauthorized access.
  2. 6. A step-by-step procedure for solving a problem.
  3. 7. Instructions written in a programming language.
  4. 8. Local Area Network, a network that connects computers within a limited area.
  5. 10. Storing and accessing data and programs over the internet instead of a local computer.
  6. 16. Software that translates high-level programming code into machine-readable code.
  7. 17. A person who gains unauthorized access to computer systems or networks.
  8. 19. An operating system developed by Microsoft.
  9. 20. A secret combination of characters used to authenticate a user's identity.
  10. 22. Measures taken to protect computer systems and data from unauthorized access or attacks.
  11. 24. A networking device that forwards data packets between computer networks.
  12. 26. A software tool used for organizing and analyzing data in rows and columns.
  13. 29. Malicious software disguised as legitimate software.
  14. 31. A type of malicious software that can replicate itself and spread to other computers.
  15. 33. Uniform Resource Locator, the address used to access resources on the internet.
  16. 36. Wireless Fidelity, a technology that allows devices to connect to the internet wirelessly.
  17. 38. The process of creating computer programs using programming languages.
  18. 40. Universal Serial Bus, a common interface for connecting devices to a computer.
Down
  1. 1. A display device used to view output from a computer.
  2. 2. An input device used to enter data and commands into a computer.
  3. 3. A global network of interconnected computers and devices.
  4. 4. A popular programming language used for developing a wide range of applications.
  5. 9. Programs and applications that run on a computer system.
  6. 11. Hypertext Markup Language, the standard language for creating web pages.
  7. 12. Structured Query Language, a programming language used for managing and manipulating databases.
  8. 13. Software used to access and view websites on the internet.
  9. 14. Transmission Control Protocol/Internet Protocol, the basic communication protocol of the internet.
  10. 15. Malicious software designed to harm or exploit computer systems.
  11. 18. Creating a copy of data to protect against loss or damage.
  12. 21. The capacity to hold and retain data or information.
  13. 23. A network security system that monitors and controls incoming and outgoing network traffic
  14. 25. development: The process of creating websites and web applications.
  15. 27. A computer or system that provides resources or services to other computers or clients.
  16. 28. Virtual Private Network, a secure connection between a user and a private network over the internet.
  17. 30. system: Software that manages computer hardware and software resources.
  18. 32. A structured collection of data stored and organized for easy retrieval.
  19. 34. The process of identifying and fixing errors or bugs in software code.
  20. 35. A network security system that monitors and controls incoming and outgoing network traffic.
  21. 37. Extensible Markup Language, a markup language used for storing and transporting data.
  22. 39. A group of interconnected computers and devices.