Test
Across
- 3. A type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data.
- 5. A third generation high level language
- 6. Graphic interfaces were first used in a xerox product is called
- 7. Random Access Memory
- 8. Integrated Service Digital Network
- 11. Which of the following represents an application file extension
- 13. Process of recovering passwords from data that have been stored in or transmitted by a computer system
- 15. A microprocessor
- 17. India’s first super computer is
- 18. A binary digit of either a 1 or 0
Down
- 1. Father of artificial intelligence
- 2. The first mechanical computer designed by Charles Babbage was called
- 3. Java was originally invented by
- 4. Internet Protocol
- 9. Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
- 10. The parity bit is added for the purpose of
- 12. IC chips used in computers are usually made of
- 14. most powerful type of computer
- 16. Transmission control Protocol