TechCrossword
Across
- 2. What technology allows a process to perform multiple tasks concurrently?
- 3. Source Computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose.
- 5. A technique in web development that allows parts of a page to be updated without a full page reload, enhancing user experience.
- 8. Which Java keyword is used to implement multiple inheritance?
- 10. Name the first word of the method used to convert a string to a primitive data type in Java?
- 13. What is the unique identifier assigned to a specific device on a network?
- 14. What is the term for a unique string of characters used to authenticate a user?
- 15. What cryptographic protocol secures data transmission over a computer network, commonly used for secure websites?
- 18. Functionality Allowing Programs to Run Without Knowing the Underlying Hardware Details
- 21. Method used to dynamically change the memory allocation of a previously allocated memory in C
- 22. Data Structure Combining Properties of Queue and Stack
- 23. Algorithmic Paradigm Focused on Making Locally Optimal Choices
- 25. Programming Language Known for its Simplicity and Readability
- 26. What is the term for a self-contained, reusable piece of code in programming?
- 29. What is the term for the process of finding and fixing errors in a program?
Down
- 1. Original company known for developing the Java programming language?
- 4. What is the term for a software program designed to cause harm to a computer system?
- 6. Java Feature for Automatic Memory Management
- 7. Level The highest level of abstraction in DBMS
- 9. Which class is the superclass for all exception classes in Java?
- 11. What is the fundamental unit of information in computing and digital communications?
- 12. What type of attack involves flooding a network or service with an overwhelming amount of traffic?
- 16. Which design pattern restricts the instantiation of a class to one single instance?
- 17. A type of attack that involves tricking people into revealing confidential information.
- 19. A hardware component that temporarily stores frequently accessed data for quicker retrieval.
- 20. Synchronization Mechanism Ensuring Mutual Exclusion
- 24. What term is used to describe a function that calls itself?
- 27. Application that provides comprehensive facilities for software development.
- 28. A technology company known for designing and manufacturing graphics processing units (GPUs).
- 30. Web-based Source Control System that allows developers to create, store, and manage their code.