Across
- 4. - A unit of digital storage equal to 1,024 gigabytes.
- 6. - A reference in a document that connects to another location or file.
- 8. - Increasing a computer component’s speed beyond its specifications.
- 11. - A cryptographic technique that uses quantum mechanics.
- 13. - An organized collection of structured information or data.
- 15. - A global network connecting millions of devices.
- 16. - A cyber attack that tricks users into revealing personal information.
- 19. - The maximum rate of data transfer across a network.
- 23. - A security system that monitors and controls network traffic.
- 24. - A temporary storage area for frequently accessed data.
- 25. - Software with publicly available source code.
- 30. - A type of AI that mimics human intelligence.
- 31. - Temporary memory used for quick access.
- 33. - The process of replacing sensitive data with unique identifiers.
- 34. - A digital storage space in the cloud.
- 36. - Data that describes other data.
- 39. - A device that connects networks.
- 40. - A wireless networking technology.
- 41. - A step-by-step procedure for solving a problem.
- 43. - The delivery of computing services over the internet.
- 44. - Unwanted or unsolicited messages, typically emails.
- 45. - A self-replicating computer program.
- 47. - The smallest unit of data in computing.
- 48. - A secret code used for security.
- 50. - The smallest unit of a digital image.
Down
- 1. - A decentralized ledger technology used in cryptocurrencies.
- 2. - A program that translates source code into machine code.
- 3. - Permanent software programmed into a hardware device.
- 5. - An error in programming.
- 7. - The manipulation of matter on an atomic scale.
- 9. - A software testing method to verify previous functionality.
- 10. - A set of rules for data transmission.
- 12. - Software that harms a system.
- 14. - The simulation of human intelligence in machines.
- 17. - The delay before data is transferred over a network.
- 18. - A technology that overlays digital content on the real world.
- 20. - A subset of machine learning using neural networks.
- 21. - The process of creating a virtual version of computing resources, such as servers or storage.
- 22. - The practice of protecting systems and networks from digital attacks.
- 26. - The part of a system that users interact with.
- 27. - The process of converting information into a secure format.
- 28. - A type of malware that spreads across networks automatically.
- 29. - A program that performs a specific task.
- 32. - A memory management technique using disk storage.
- 35. - The process of converting analog data to digital.
- 37. - A common wired networking technology.
- 38. - A tool used to test and fix errors in software.
- 42. - The physical parts of a computer.
- 46. - A collection of tools for software development.
- 49. - The brain of a computer.
