COMPUTER SCIENCE TERMINOLOGY

123456789
Across
  1. 1. Software designed to harm or exploit any device, service, or network, often by causing damage, stealing information, or gaining unauthorized access.
  2. 4. A device that forwards data packets between computer networks, directing them to their destination by using routing tables.
  3. 5. A type of malware that attaches itself to legitimate software or files and spreads to other systems, often causing harm or disruption.
  4. 8. The process of verifying the identity of a user, device, or system before granting access to resources or services.
  5. 9. A computer or system that provides services, data, or resources to other computers (clients) over a network.
Down
  1. 2. The process of converting data into a code or cipher to prevent unauthorized access, ensuring confidentiality during storage or transmissionIP Address A unique numerical label assigned to each device connected to a computer network, used for identification and location addressing.
  2. 3. A global network of interconnected computer systems that communicate via standardized protocols, enabling access to information, communication, and services.
  3. 6. A security system that monitors and controls incoming and outgoing network traffic, based on predetermined security rules to protect a network from unauthorized access.
  4. 7. A family of network technologies used for local area networks (LANs), typically using cables to transmit data between devices.