IT

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 2. What allows communication between different software components?
  2. 4. What encapsulates applications and dependencies into isolated units?
  3. 6. What device connects multiple devices in a network and forwards data?
  4. 10. What process verifies the identity of a user or device?
  5. 13. What process involves creating copies of data to prevent loss?
  6. 17. What software allows multiple virtual machines on a single physical machine?
  7. 18. What technology allows multiple virtual environments on one system?
  8. 19. What is a popular tool for building, running, and managing containers?
  9. 20. What protocol automatically assigns IP addresses to devices?
  10. 22. What protocol provides secure remote access to devices?
  11. 23. What was the predecessor to TLS for securing communications?
  12. 25. What cryptographic protocol secures network communications, succeeding SSL?
  13. 27. What protocol manages packet routing across the internet?
  14. 30. What segments a network into logical groups, regardless of location?
  15. 31. What smaller network is defined by a subnet mask?
  16. 32. What architectural style organizes applications into loosely coupled services?
  17. 34. What measures the amount of data processed by a system in a given time?
  18. 37. What open-source operating system is widely used for servers?
  19. 38. What operating system is developed by Microsoft?
  20. 39. What process converts data into a fixed-size string for verification?
  21. 40. What term describes the delay in network communication?
Down
  1. 1. What measures the maximum data transfer rate of a network?
  2. 3. What optimizes data retrieval by creating quick access paths?
  3. 5. What process secures data by converting it into a protected format?
  4. 7. What platform automates the deployment and scaling of containers?
  5. 8. What data structure pairs keys with values for fast retrieval?
  6. 9. What involves tracking and analyzing system performance?
  7. 11. What provides on-demand access to computing resources over the internet?
  8. 12. What is an organized collection of data for easy access and management?
  9. 14. What is a network security device that monitors and filters traffic?
  10. 15. What device connects multiple networks and directs data packets?
  11. 16. What distributes network or application traffic across multiple servers?
  12. 21. What field focuses on protecting systems and data from attacks?
  13. 24. What is a formatted unit of data transmitted over a network?
  14. 26. What is the process of identifying and fixing code errors?
  15. 28. What is a set of rules for communication between devices?
  16. 29. What internet protocol version expands the address space to 128 bits?
  17. 33. What is the process of saving data for future use?
  18. 35. What system translates domain names into IP addresses?
  19. 36. What routing protocol operates within an autonomous system?