Across
- 4. A system that translates domain names into IP addresses
- 5. A protective system that blocks unauthorized access
- 8. Any software designed to harm or exploit a computer system
- 9. A temporary storage area where data is stored before being processed
- 10. A device that connects computers to a network
- 12. A structured collection of data stored in a computer
- 14. The smallest unit of a digital image
- 16. This type of memory loses its data when power is turned off
- 17. A cyberattack where someone pretends to be a trusted entity to steal data
Down
- 1. A key used to enter a computer system securely
- 2. A network of interconnected computers that communicate with each other
- 3. A widely used version control system
- 6. A process of converting data into a secure format to prevent unauthorized access
- 7. A malicious software program that can replicate itself and spread
- 11. A wireless technology used for short-range communication between devices
- 13. A step-by-step procedure used for problem-solving in computing
- 15. A command-line interface in Linux
- 17. A server that acts as an intermediary between a user and the internet.
