IT theme
Across
- 4. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 5. A secret word or phrase that must be used to gain admission to something.
- 8. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 9. The physical components of a computer system.
- 11. The process of converting information or data into a code, especially to prevent unauthorized access.
- 12. The maximum rate of data transfer across a given path.
- 13. The central part of an operating system, managing system resources and communication between hardware and software.
- 15. A set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Down
- 1. A programming language commonly used in web development.
- 2. A point where two systems, subjects, organizations, etc., meet and interact.
- 3. A type of computing that relies on sharing computing resources rather than having local servers handle applications.
- 6. A small, portable personal computer with a screen and keyboard.
- 7. A group of interconnected computers.
- 10. An organized collection of data, generally stored and accessed electronically from a computer system.
- 14. A unit of information equal to one billion bytes.