Across
- 2. Faking identity to deceive.
- 4. Delay in network communication.
- 6. Classic single-player card game.
- 8. Original Name of Google Search Engine
- 12. Mozilla's open-source browser
- 15. Classic game featuring Inky, Blinky, Pinky and Clyde
- 16. Network security barrier.
- 17. Hidden folder for user-specific app data.
- 19. This program is widely used for graphic design and photo manipulation.
- 20. Digital key for authentication.
Down
- 1. Embedded software in hardware.
- 3. Malware disguised as legitimate software.
- 5. Command-line tool for automation.
- 7. Temporary storage for fast access.
- 9. Software that initializes the hardware during the booting process
- 10. Data rate in media streams.
- 11. Browser-stored user data.
- 13. Test to differentiate humans from bots.
- 14. Data transformed into a fixed-length string.
- 18. Server acting as an intermediary.