Across
- 2. Server acting as an intermediary.
- 4. Embedded software in hardware.
- 7. Browser-stored user data.
- 9. Faking identity to deceive.
- 10. Software that initializes the hardware during the booting process
- 11. Hidden folder for user-specific app data.
- 12. Network security barrier.
- 14. Command-line tool for automation.
- 17. Temporary storage for fast access.
- 18. Malware disguised as legitimate software.
Down
- 1. Classic single-player card game.
- 3. Classic game featuring Inky, Blinky, Pinky and Clyde
- 5. This program is widely used for graphic design and photo manipulation.
- 6. Digital key for authentication
- 8. Test to differentiate humans from bots.
- 10. Data rate in media streams.
- 12. Mozilla's open-source browser
- 13. Original Name of Google Search Engine
- 15. Data transformed into a fixed-length string.
- 16. Delay in network communication.