Across
- 2. Set of rules used to control the exchange of information that is understood by the transmitter and receivers.
- 9. A type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
- 10. The motherboard also holds the __________of the computer.
- 11. Father Of C Programming.
- 12. A device that filters and forwards packets between LAN segments.
- 13. Heart Of The Operating System.
- 15. A network designed to allow communication within an organization is called______.
- 16. Android 8.
- 19. Present Owner Of Java.
Down
- 1. C programs are converted into machine language with the help of a _________.
- 3. Who invented WWW?
- 4. The monitor is connected to the computer using a __.
- 5. A graphical or pictorial representation of an algorithm.
- 6. A form of separation of presentation and content for web design in which the markup (HTML or XHTML) of a webpage contains the page's semantic content and structure, but does not define its visual layout.
- 7. System of numerical notation that has 2 rather than 10 as a base.
- 8. Code used to cause harm to a computer or file.
- 10. The standard size of data in a computer; 8-bits.
- 14. CEO of Apple.
- 17. Unique 6-byte address associated with and coded into each network interface card (NIC); address assignment is controlled by the IEEE.
- 18. Where do the arithmetic calculations take place in a computer system.
