Math & IT
Across
- 3. The time delay between an input and the corresponding output.
- 4. A program that translates code from a high-level language into a lower-level one.
- 10. A program that converts low-level symbolic instructions into machine-readable form.
- 13. A process where a function calls itself to solve smaller instances of a problem.
- 15. A numerical label used to divide an IP address into network and host parts.
- 17. Modern firmware that initializes hardware, supports larger storage, and provides an interface before the operating system loads.
- 19. The result of multiplying two or more numbers.
- 20. A visual pattern of parallel lines representing information that can be read by a scanner.
- 21. Two numbers whose greatest common divisor is 1.
- 25. Random data added to a password before hashing to increase security.
- 29. A connection point within a network that can send, receive, or process data.
- 31. A computer that provides resources, data, or services to other machines over a network.
- 32. A tool for encoding and decoding digital media files.
- 33. A method of reasoning or proof where general conclusions are drawn from specific cases.
- 34. The measure of detail in an image or display, given by the number of pixels.
- 39. A mounted hardware unit with ports for managing and connecting network cables.
- 40. A small external device that adds functionality or enables access to software or networks.
- 43. The branch of mathematics dealing with basic number operations.
- 44. A mathematical statement asserting that two expressions are equal.
- 45. A base-16 numeral system using digits 0–9 and letters A–F.
- 46. The creation of a virtual version of hardware, storage, or networks to run multiple systems on one machine.
- 49. Firmware that initializes hardware and starts the boot process before the operating system loads.
- 50. A set of rules governing communication between devices.
Down
- 1. The point of interaction between two systems, devices, or programs.
- 2. An error screen shown by some operating systems when the system encounters a critical failure.
- 5. A number that indicates how many times a base is multiplied by itself.
- 6. A symbol in logic or mathematics that specifies the quantity of elements under discussion.
- 7. A number sequence where each term is the sum of the two preceding terms.
- 8. A proven statement used as a stepping stone toward a larger result in mathematics.
- 9. The result obtained by dividing one number by another.
- 11. The number that is to be taken away in a subtraction.
- 12. A condition where two figures or numbers have the same shape, size, or equivalence under a relation.
- 14. A communication pathway that transfers data between components inside a computer.
- 16. A device that connects devices in a network and forwards data only where needed.
- 18. A program that directly executes instructions written in a high-level programming language.
- 22. A cyberattack that tricks users into giving away sensitive information by pretending to be trustworthy.
- 23. A CPU technology that allows one physical processor core to handle multiple instruction threads simultaneously.
- 24. The lowest-level instructions understood directly by a computer’s CPU.
- 26. The power to which a base must be raised to produce a given number.
- 27. A temporary exchange of information between a user and a system.
- 28. The product of all positive integers up to a given number.
- 30. A file format containing instructions a computer can run directly.
- 35. A method of combining multiple storage drives for improved performance, redundancy, or both.
- 36. A rectangular arrangement of numbers or symbols in rows and columns.
- 37. A device that directs data between computer networks.
- 38. An organized collection of structured information stored electronically.
- 41. Using a mobile device to share its internet connection with other devices.
- 42. Unencrypted, readable data or text.
- 46. A unit of volume representing a value in three-dimensional space.
- 47. A piece of software or method that takes advantage of a system vulnerability.
- 48. A small memory component powered by a battery that stores system settings such as time and configuration.