IT
Across
- 2. What allows communication between different software components?
- 4. What encapsulates applications and dependencies into isolated units?
- 6. What device connects multiple devices in a network and forwards data?
- 10. What process verifies the identity of a user or device?
- 13. What process involves creating copies of data to prevent loss?
- 17. What software allows multiple virtual machines on a single physical machine?
- 18. What technology allows multiple virtual environments on one system?
- 19. What is a popular tool for building, running, and managing containers?
- 20. What protocol automatically assigns IP addresses to devices?
- 22. What protocol provides secure remote access to devices?
- 23. What was the predecessor to TLS for securing communications?
- 25. What cryptographic protocol secures network communications, succeeding SSL?
- 27. What protocol manages packet routing across the internet?
- 30. What segments a network into logical groups, regardless of location?
- 31. What smaller network is defined by a subnet mask?
- 32. What architectural style organizes applications into loosely coupled services?
- 34. What measures the amount of data processed by a system in a given time?
- 37. What open-source operating system is widely used for servers?
- 38. What operating system is developed by Microsoft?
- 39. What process converts data into a fixed-size string for verification?
- 40. What term describes the delay in network communication?
Down
- 1. What measures the maximum data transfer rate of a network?
- 3. What optimizes data retrieval by creating quick access paths?
- 5. What process secures data by converting it into a protected format?
- 7. What platform automates the deployment and scaling of containers?
- 8. What data structure pairs keys with values for fast retrieval?
- 9. What involves tracking and analyzing system performance?
- 11. What provides on-demand access to computing resources over the internet?
- 12. What is an organized collection of data for easy access and management?
- 14. What is a network security device that monitors and filters traffic?
- 15. What device connects multiple networks and directs data packets?
- 16. What distributes network or application traffic across multiple servers?
- 21. What field focuses on protecting systems and data from attacks?
- 24. What is a formatted unit of data transmitted over a network?
- 26. What is the process of identifying and fixing code errors?
- 28. What is a set of rules for communication between devices?
- 29. What internet protocol version expands the address space to 128 bits?
- 33. What is the process of saving data for future use?
- 35. What system translates domain names into IP addresses?
- 36. What routing protocol operates within an autonomous system?