IT Newsletter WordSearch #2
Across
- 1. A server that acts as an intermediary between a user and the internet.
- 5. A popular web security and performance company protecting websites.
- 7. The number of bits transmitted per second in a digital signal.
- 9. The process of verifying a user's identity in security systems.
- 10. A methodology combining software development and IT operations.
- 11. A process of converting data into a fixed-length string for security.
- 12. Gains unauthorized access to computer systems for various purposes.
- 13. A value used to verify the integrity of data during transmission.
- 15. A program that translates source code into machine code.
- 16. Software embedded into hardware, often for low-level control functions.
- 17. A facility that houses critical IT infrastructure, such as servers.
Down
- 1. A cyber scam where attackers trick users into providing sensitive information.
- 2. A malicious attempt to gain access to or damage computer systems.
- 3. A program that initializes the operating system when a computer starts.
- 4. A revolutionary computing method using quantum bits (qubits) instead of traditional binary.
- 5. A method of packaging software and dependencies for deployment.
- 6. A wired networking technology for local area networks (LANs).
- 7. A decentralized and tamper-proof digital ledger technology.
- 8. Fake media created by the manipulation of real media by AI.
- 14. An architectural approach where applications are built as small, independent services.