The Computer Science Crossword
Across
- 2. A security system that monitors and controls incoming and outgoing network traffic.
- 5. A form of memory that uses secondary storage as if it were RAM, extending the address space.
- 9. The protocol responsible for addressing and routing data packets across the internet.
- 10. Converting a key into a value for indexing, often used in security or data retrieval.
- 14. A set of rules governing data transmission between devices.
- 15. A step-by-step procedure for solving a problem or achieving a goal.
- 18. Computer scientist famous for a theoretical "machine" and breaking the Enigma code.
Down
- 1. Volatile memory used to store data and instructions for currently running programs.
- 3. The process of converting information into a secure code to prevent unauthorized access.
- 4. Small, very fast memory used by the CPU to store frequently accessed data and instructions.
- 6. The number system based on the number 2, using only 0s and 1s.
- 7. A segment of a process that can be managed independently by the scheduler.
- 8. The most basic logic gate; output is only 1 if both inputs are 1.
- 11. The process of simplifying a system by hiding complex details.
- 12. Two or more computers linked together to share resources.
- 13. A program that translates source code into machine code all at once before execution.
- 16. Small, high-speed storage locations within the CPU that hold data and instructions temporarily.
- 17. The collective name for a group of 8 bits.