Jomar's CROSSWORD PUZZLE on CIS1102N

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 2. It is a type of software embedded in hardware devices, providing low-level control for the device's specific functions.
  2. 6. It is a file that contains a program or application that can be run or executed on a computer.
  3. 7. It is the process of verifying the identity of a user, ensuring that they are who they claim to be.
  4. 11. It is the process of reorganizing the data on a storage device to improve access times and overall system performance.
  5. 14. This software is used for creating, editing, and manipulating visual elements. Examples include Adobe Photoshop and GIMP.
  6. 16. This software manages the storage, retrieval, and organization of data. Examples include MySQL, Oracle, and Microsoft SQL Server.
  7. 19. This software creates virtual instances of computer resources, allowing multiple operating systems or applications to run on a single physical machine.
  8. 20. It is the server-side of an application that handles data storage, processing, and business logic.
  9. 23. It refers to an application's ability to handle increased load and user activity without compromising performance.
  10. 27. This (UX)encompasses the overall experience a user has with an application. It involves aspects such as ease of use, accessibility, and the emotional response elicited by the interface.
  11. 30. _______ apps promote teamwork and communication among individuals or groups. They typically include features like file sharing, messaging, and project collaboration tools, fostering efficient collaboration in both professional and personal settings.
  12. 33. These devices are connected to a computer, such as printers, scanners, or external drives.
  13. 34. These applications facilitate interaction between users, such as email clients, messaging apps, and video conferencing tools.
  14. 35. It is the client-side of an application that users interact with. It includes the graphical elements and user interface components that users see and interact with directly.
  15. 36. It is a popular example of a note-taking app that enables users to capture and organize ideas, thoughts, and information.
  16. 37. They are crucial for anti-virus software to stay effective against evolving threats. They typically include new virus definitions, security patches, and improvements to the software's detection and removal capabilities, keeping it current and robust.
  17. 39. This software is designed to detect, prevent, and remove malicious software (malware) from a computer or network, safeguarding against security threats.
  18. 40. These utilities reduce the size of files or folders, making them easier to store, transfer, and manage.
Down
  1. 1. These applications include integrated development environments (IDEs) and tools for software developers to create, test, and debug code.
  2. 3. This software models real-world processes or systems, allowing users to analyze and understand their behavior without real-world consequences.
  3. 4. It is a security measure that isolates suspicious or infected files from the rest of the system to prevent further damage.
  4. 5. _______ System. It is software that manages computer hardware and provides services for computer programs.
  5. 8. It involves making copies of data to prevent loss in the event of data corruption, hardware failure, or other unforeseen issues.
  6. 9. It is a software application used to access information on the internet. Popular examples include Chrome, Firefox, and Safari.
  7. 10. It is a security barrier that monitors and controls incoming and outgoing network traffic.
  8. 12. These applications enable users to create and manipulate visual elements, including photo editing software.
  9. 13. These apps help users organize, prioritize, and track their tasks and activities. These tools often include features like to-do lists, deadlines, and project collaboration to enhance productivity.
  10. 15. It involves using algorithms and behavioral analysis to identify previously unknown or evolving threats.
  11. 17. It acts as a bridge between the frontend and backend of an application. It facilitates communication and data exchange between different components, helping them work together efficiently.
  12. 18. It refers to any software specifically designed to harm, exploit, or infiltrate computer systems without the owner's consent.
  13. 21. It is the process of restoring lost or deleted data from storage devices, often after accidental deletion or hardware failure.
  14. 22. It involves the use of unique physical or behavioral characteristics, such as fingerprints or facial recognition, for user authentication.
  15. 24. They are step-by-step procedures or formulas for solving problems and performing tasks in software development and computing.
  16. 25. This (UI) refers to the graphical layout of an application, including buttons, icons, and other visual elements that users interact with.
  17. 26. These applications help users accomplish tasks efficiently, such as word processors, spreadsheets, and presentation software.
  18. 28. These apps allow users to schedule and manage events, appointments, and deadlines.
  19. 29. It is software that enables communication between the operating system and hardware devices, ensuring proper functionality.
  20. 31. It is the process of examining software, files, or the entire system for potential threats such as viruses, malware, or other malicious code.
  21. 32. It is a piece of software designed to update or fix problems with a computer program.
  22. 38. It refers to the base-2 numeral system used in computing, representing information using only 0s and 1s.