The Giant Tech Cross-Word
Across
- 3. A data type that has two possible values: “true” and “false”
- 6. A name one makes up in order to see or perform things on a website
- 9. Group of malicious programs leveraging the functionality of combination of virus, worms, backdoors etc.
- 10. Logic gate which gives high when both inputs are opposite
- 11. A number assigned to any item that is connected to the Internet
- 12. Smallest unit of memory
- 13. Amazon started by selling only this product
- 14. Calling oneself from within oneself
- 18. A+B+C+D+E+F
- 20. Is a detailed, yet readable, description of what a computer program or algorithm must do, expressed in languages that humans use naturally
- 21. In SQL databases, we fetch information by making a ________
- 22. A program that converts instructions into a machine-code or lower-level form so that they can be read and executed by a computer
- 23. A repetitive action or command typically created with programming loops
- 25. Cryptocurrency is based on
- 28. A system of interactive visual components for computer software
- 29. The process of converting information into code to prevent unauthorised access
- 30. A coded algorithm having ability to be executed by a machine
Down
- 1. Software designed to detect and destroy malicious programs
- 2. Small area of a very fast memory in CPU
- 4. Interface Between Computer Software and Hardware
- 5. string s = "ACDS"; for(int i=0;i<3;i++) cout<<s[++i];
- 7. The fundamental unit of a digital image
- 8. Alternate address/name for calling a web page (different from the one which computer uses internally)
- 15. Running CPU at a faster speed
- 16. A network security system, either hardware or software based, that controls incoming or outgoing traffic based on set of predefined rules
- 17. The service responsible for mapping human names of webpages to computer names of webpages
- 19. A sequence of instructions which is given a name and can be executed anytime as well as any number of times
- 24. The process of fooling an online account holder in giving certain information by pretending as legitimate firm
- 26. Unprocessed Information
- 27. A way of representing information using only two options