The Giant Tech Cross-Word

123456789101112131415161718192021222324252627282930
Across
  1. 3. A data type that has two possible values: “true” and “false”
  2. 6. A name one makes up in order to see or perform things on a website
  3. 9. Group of malicious programs leveraging the functionality of combination of virus, worms, backdoors etc.
  4. 10. Logic gate which gives high when both inputs are opposite
  5. 11. A number assigned to any item that is connected to the Internet
  6. 12. Smallest unit of memory
  7. 13. Amazon started by selling only this product
  8. 14. Calling oneself from within oneself
  9. 18. A+B+C+D+E+F
  10. 20. Is a detailed, yet readable, description of what a computer program or algorithm must do, expressed in languages that humans use naturally
  11. 21. In SQL databases, we fetch information by making a ________
  12. 22. A program that converts instructions into a machine-code or lower-level form so that they can be read and executed by a computer
  13. 23. A repetitive action or command typically created with programming loops
  14. 25. Cryptocurrency is based on
  15. 28. A system of interactive visual components for computer software
  16. 29. The process of converting information into code to prevent unauthorised access
  17. 30. A coded algorithm having ability to be executed by a machine
Down
  1. 1. Software designed to detect and destroy malicious programs
  2. 2. Small area of a very fast memory in CPU
  3. 4. Interface Between Computer Software and Hardware
  4. 5. string s = "ACDS"; for(int i=0;i<3;i++) cout<<s[++i];
  5. 7. The fundamental unit of a digital image
  6. 8. Alternate address/name for calling a web page (different from the one which computer uses internally)
  7. 15. Running CPU at a faster speed
  8. 16. A network security system, either hardware or software based, that controls incoming or outgoing traffic based on set of predefined rules
  9. 17. The service responsible for mapping human names of webpages to computer names of webpages
  10. 19. A sequence of instructions which is given a name and can be executed anytime as well as any number of times
  11. 24. The process of fooling an online account holder in giving certain information by pretending as legitimate firm
  12. 26. Unprocessed Information
  13. 27. A way of representing information using only two options