Technovation -Play & Conquer
Across
- 4. Numerical identifier uniquely assigned to each device in a network
- 7. ML technique grouping data points with similar properties
- 9. Statistical technique modeling relationships between dependent and independent variables
- 10. Iterative approach to adaptive software development
- 11. Integration of software development and IT operations practices
- 12. Cyberattack where attackers trick users into revealing sensitive information
- 16. Protocol for secure authorization in web applications
- 18. ML method for testing model performance using multiple train-test splits
- 19. NLP process of splitting text into smaller meaningful units like words or phrases
- 22. NLP process of reducing words to base form using vocabulary and grammar
- 23. Ensemble learning algorithm using multiple decision trees for classification
- 24. Self-replicating malware that spreads across networks
- 25. NLP technique reducing words to their root form (e.g., running → run)
- 26. Network security system that monitors and controls traffic
- 27. Device that forwards data packets between networks
Down
- 1. On-demand availability of computing resources over the internet
- 2. Malicious software that secretly monitors user activity
- 3. Lightweight data-interchange format widely used in web APIs
- 5. Extremely large datasets requiring advanced analysis techniques
- 6. Malware disguised as legitimate software but performing harmful actions
- 8. ML condition where a model is too simple to capture patterns in data
- 13. Ensemble ML technique combining weak learners into strong predictors
- 14. Hierarchical system mapping human-readable names to IP addresses
- 15. ML paradigm where an agent learns through trial and reward feedback
- 17. Process of discovering hidden patterns in large datasets
- 20. Open-source library widely used for deep learning and ML applications
- 21. Distributed and immutable ledger enabling secure transactions