Across
- 3. are the practice of sending fraudulent communications that appear to come from a reputable source.
- 4. is an interconnected system of public webpages accessible through the Internet.
- 6. is an integer data type in MySQL.
- 10. is a key in a relational database that is unique for each record.
- 11. A computer program that can copy itself and infect a computer without permission or knowledge of the user.
- 13. are tools you can use to differentiate between real users and automated users, such as bots.
- 16. is the conversion of data from a readable format into an encoded format.
- 17. a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle.
- 18. is a general term used to describe any unexpected problem with hardware or software.
- 19. a person who utilizes a computer or network service.
- 20. is a column or group of columns in a relational database table that provides a link between data in two tables.
Down
- 1. A device with an internal battery that allows connected devices to run for at least a short time when the primary power source is lost.
- 2. program that manages a computer's resources, especially the allocation of those resources among other programs.
- 5. computer hardware or software that prevents unauthorized access to private data.
- 7. A data type used for storing text whose length can have a maximum of 65535 characters in MySQL.
- 8. write code for computer programs and mobile applications.
- 9. Computer components that have a physical existence and can be touched.
- 11. describes the opportunity to establish a protected network connection when using public networks.
- 12. Is a set of instructions and documentation that tells a computer what to do or how to perform a task.
- 14. is a vocabulary and set of grammatical rules for instructing a computer or computing device to perform specific tasks.
- 15. An extremely popular scripting language that is used to create dynamic Web pages.