.

1234567891011121314151617181920
Across
  1. 2. Faking identity to deceive.
  2. 4. Delay in network communication.
  3. 6. Classic single-player card game.
  4. 8. Original Name of Google Search Engine
  5. 12. Mozilla's open-source browser
  6. 15. Classic game featuring Inky, Blinky, Pinky and Clyde
  7. 16. Network security barrier.
  8. 17. Hidden folder for user-specific app data.
  9. 19. This program is widely used for graphic design and photo manipulation.
  10. 20. Digital key for authentication.
Down
  1. 1. Embedded software in hardware.
  2. 3. Malware disguised as legitimate software.
  3. 5. Command-line tool for automation.
  4. 7. Temporary storage for fast access.
  5. 9. Software that initializes the hardware during the booting process
  6. 10. Data rate in media streams.
  7. 11. Browser-stored user data.
  8. 13. Test to differentiate humans from bots.
  9. 14. Data transformed into a fixed-length string.
  10. 18. Server acting as an intermediary.