IT Quiz
Across
- 3. Information that is stored and processed by computers.
- 4. The physical components of a computer system.
- 6. The practice of protecting systems, networks, and programs from digital attacks.
- 11. Verifying the identity of a user, system, or application.
- 13. A software application used to access information on the World Wide Web.
- 16. The address used to access resources on the World Wide Web.
- 17. The process of converting information into a code to secure it from unauthorized access.
- 18. Computing The delivery of computing services over the internet, such as storage and processing power.
- 19. The address used to access resources on the World Wide Web.
- 22. A step-by-step procedure for solving a problem or accomplishing a task.
- 23. Software designed to harm or exploit computer systems.
- 24. A software update designed to fix security vulnerabilities.
- 25. Learning A subset of AI that enables systems to learn and improve from experience.
- 26. A security system that monitors and controls incoming and outgoing network traffic.
- 27. A computer or system that manages network resources and provides services to other computers.
- 29. A network that connects computers within a limited area, such as a home, office, or campus.
Down
- 1. A number system that uses only two digits, 0 and 1.
- 2. A fraudulent attempt to obtain sensitive information, often through deceptive emails.
- 5. A device that detects and measures physical stimuli, often used by AI systems.
- 7. A computer program designed to simulate conversation with human users.
- 8. A global network connecting millions of private, public, academic, business, and government networks.
- 9. The smallest unit of digital information.
- 10. A machine designed to carry out tasks autonomously or with minimal human intervention.
- 12. An authentication method using two different factors, like a password and a security code.
- 14. The process of designing and building an executable computer program.
- 15. The standard markup language for creating web pages.
- 18. Criminal activities carried out using the internet.
- 20. Vision AI's capability to interpret and make decisions based on visual data.
- 21. A structured collection of data that is stored and organized for easy retrieval.
- 27. Programs and applications that run on a computer.
- 28. Malicious software that can replicate itself and spread to other computers.