Across
- 3. An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result.
- 4. A decentralized, distributed ledger technology that records transactions across multiple computers in a way that is secure, transparent, and tamper-resistant.
- 6. The process of converting data into a code to prevent unauthorized access.
- 10. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in electronic communication.
- 12. The process of verifying the identity of a user or system, typically through the use of passwords, biometric data, or cryptographic keys.
- 13. A networking device that forwards data packets between computer networks, typically using IP addresses.
Down
- 1. A small piece of data sent from a website and stored on the user's device, used to track user activity and preferences.
- 2. A hardware or software component that stores data temporarily to reduce access time and improve system performance.
- 3. A numbering system that uses only two digits, 0 and 1.
- 5. A step-by-step set of rules to be followed in calculations or problem-solving operations.
- 7. A unit of data transmitted over a network, typically consisting of a header containing routing information and a payload containing the actual data being transmitted.
- 8. A malicious software program that replicates itself by modifying other computer programs and inserting its own code.
- 9. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 11. A popular agile framework for managing software development projects, emphasizing iterative development, frequent inspection, and adaptation.
