Technology Advance

123456789101112131415161718192021222324252627282930
Across
  1. 2. - A set of rules governing the exchange or transmission of data between devices.
  2. 6. - A step-by-step procedure for solving a problem.
  3. 8. - A hardware or software component that stores data so future requests for that data can be served faster.
  4. 11. - A network security system that monitors and controls incoming and outgoing network traffic.
  5. 13. - The process of converting information or data into a code to prevent unauthorized access.
  6. 15. - The programs and other operating information used by a computer.
  7. 17. - A small segment of data sent over a network.
  8. 21. - Internet of Things, a network of physical objects embedded with sensors and software.
  9. 22. System - Software that manages computer hardware and software resources.
  10. 24. - The amount of data that can be transmitted over a network in a given amount of time.
  11. 25. - Finding and fixing errors in software code.
  12. 26. - Measures taken to protect a computer or computer system against unauthorized access or attack.
  13. 29. - Uniform Resource Locator, the address of a web page.
  14. 30. - A device that modulates and demodulates signals for data transmission.
Down
  1. 1. - Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  2. 3. - Unsolicited messages sent over the internet, typically to many users.
  3. 4. - A group of binary digits or bits (usually eight) operated on as a unit.
  4. 5. - Information processed or stored by a computer.
  5. 7. - The delay before a transfer of data begins following an instruction for its transfer.
  6. 9. - Hypertext Markup Language, the standard markup language for documents designed to be displayed in a web browser.
  7. 10. - A programming language commonly used in web development.
  8. 12. - A type of malicious software that, when executed, replicates itself by modifying other computer programs.
  9. 14. - A method of trying to gather personal information using deceptive emails and websites.
  10. 16. - The smallest unit of data in computing.
  11. 18. - Approximately one billion bytes.
  12. 19. Address - A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
  13. 20. - A software application used to access and view websites.
  14. 23. - Permanent software programmed into a read-only memory.
  15. 27. - A computer or computer program that manages access to a centralized resource or service in a network.
  16. 28. - Random Access Memory, a type of computer memory that can be accessed randomly.