IT Quiz

1234567891011121314151617181920212223242526272829
Across
  1. 3. Information that is stored and processed by computers.
  2. 4. The physical components of a computer system.
  3. 6. The practice of protecting systems, networks, and programs from digital attacks.
  4. 11. Verifying the identity of a user, system, or application.
  5. 13. A software application used to access information on the World Wide Web.
  6. 16. The address used to access resources on the World Wide Web.
  7. 17. The process of converting information into a code to secure it from unauthorized access.
  8. 18. Computing The delivery of computing services over the internet, such as storage and processing power.
  9. 19. The address used to access resources on the World Wide Web.
  10. 22. A step-by-step procedure for solving a problem or accomplishing a task.
  11. 23. Software designed to harm or exploit computer systems.
  12. 24. A software update designed to fix security vulnerabilities.
  13. 25. Learning A subset of AI that enables systems to learn and improve from experience.
  14. 26. A security system that monitors and controls incoming and outgoing network traffic.
  15. 27. A computer or system that manages network resources and provides services to other computers.
  16. 29. A network that connects computers within a limited area, such as a home, office, or campus.
Down
  1. 1. A number system that uses only two digits, 0 and 1.
  2. 2. A fraudulent attempt to obtain sensitive information, often through deceptive emails.
  3. 5. A device that detects and measures physical stimuli, often used by AI systems.
  4. 7. A computer program designed to simulate conversation with human users.
  5. 8. A global network connecting millions of private, public, academic, business, and government networks.
  6. 9. The smallest unit of digital information.
  7. 10. A machine designed to carry out tasks autonomously or with minimal human intervention.
  8. 12. An authentication method using two different factors, like a password and a security code.
  9. 14. The process of designing and building an executable computer program.
  10. 15. The standard markup language for creating web pages.
  11. 18. Criminal activities carried out using the internet.
  12. 20. Vision AI's capability to interpret and make decisions based on visual data.
  13. 21. A structured collection of data that is stored and organized for easy retrieval.
  14. 27. Programs and applications that run on a computer.
  15. 28. Malicious software that can replicate itself and spread to other computers.