Test

123456789101112131415161718
Across
  1. 3. A type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data.
  2. 5. A third generation high level language
  3. 6. Graphic interfaces were first used in a xerox product is called
  4. 7. Random Access Memory
  5. 8. Integrated Service Digital Network
  6. 11. Which of the following represents an application file extension
  7. 13. Process of recovering passwords from data that have been stored in or transmitted by a computer system
  8. 15. A microprocessor
  9. 17. India’s first super computer is
  10. 18. A binary digit of either a 1 or 0
Down
  1. 1. Father of artificial intelligence
  2. 2. The first mechanical computer designed by Charles Babbage was called
  3. 3. Java was originally invented by
  4. 4. Internet Protocol
  5. 9. Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
  6. 10. The parity bit is added for the purpose of
  7. 12. IC chips used in computers are usually made of
  8. 14. most powerful type of computer
  9. 16. Transmission control Protocol