Across
- 3. This is a deceptive method used to steal sensitive information by pretending to be a trustworthy source
- 5. It refers to the physical components of a computerthat you can touch and see
- 7. These devices display or output data from a computer
- 8. This software helps manage a company's interactions with current and potential customers
- 10. This is harmful software designed to damage or disrupt systems
- 11. It involves organizing and maintaining data processes efficiently
- 12. This type of software helps users perform specific tasks like writing or calculating
- 15. This is a set of instructions that tells a computer how to perform tasks
- 17. It involves protecting computers and networks from unauthorized access or attacks
- 18. It integrates core business processes into a single system
Down
- 1. This allows users to store and access data over the internet instead of local hardware
- 2. These devices allow users to enter data into a computer
- 4. It manages the hardware and software resources of a computer system
- 6. This is a security system that controls the incoming and outgoing network traffic
- 9. It refers to the unauthorized access or manipulation of computer systems
- 13. It secures access to systems or information using a secret combination of characters
- 14. This includes all technologies used to handle telecommunications, broadcasting, and information systems
- 16. It involves encoding information so that only authorized parties can understand it