puzzle-corner-5

1234567891011121314
Across
  1. 4. A software application used to access and navigate the internet, displaying web pages.
  2. 6. The process of transferring data from a remote server to a local device.
  3. 8. Unsolicited and often irrelevant messages sent over email or other communication platforms.
  4. 9. The process of converting information or data into a code to prevent unauthorized access.
  5. 13. A centralized repository that stores large amounts of structured data for analysis and reporting.
  6. 14. Uniform Resource Locator, the specific address used to access a resource on the internet.
Down
  1. 1. A set of rules governing the exchange of data between devices in a network.
  2. 2. A small piece of data stored on a user's device by a web browser, used to remember user preferences and login information.
  3. 3. The practice of securing information by transforming it into an unreadable format for unauthorized users.
  4. 5. A technique used to trick individuals into revealing sensitive information by masquerading as a trustworthy source.
  5. 6. A human-readable address used to access websites, such as www.example.com.
  6. 7. A unit of digital information equivalent to approximately one billion bytes.
  7. 10. Private Network A service that creates a secure and encrypted connection over a less secure network, such as the internet.
  8. 11. A copy of data stored separately to prevent loss in case of failure or corruption.
  9. 12. Malicious software designed to harm, exploit, or otherwise compromise computer systems and networks.