Across
- 1. It is a process that has completed execution but still has an entry in the process table.
- 4. It is a program can collect and transmit personal information, often without the user being aware.
- 6. It is a resource intended to provide the customer or end user with information and support related to a company's or institution's products and services.
- 8. sections of a centre sealed off from other sections.
- 11. It is a secret word or string of characters that is used for user authentication to prove identity.
- 12. duplication of equipment in case one part fails.
- 18. using physical characteristics for ID.
- 19. It is a method of exchanging digital messages from an author to one or more recipients.
Down
- 2. It is a collection of internet-connected programs communicating with other similar programs in order to perform tasks.
- 3. It is a portable computer with a built-in screen, integrated keyboard, and battery power.
- 5. It is a family of computer networking technologies for local area networks.
- 7. having different and unconnected cables to a network.
- 8. It is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
- 9. ability to withstand unexpected problems or setbacks.
- 10. It is the process of encoding messages.
- 13. time when the equipment is not functioning.
- 14. It is a collection of computers interconnected by communication channels that allow sharing of resources and information.
- 15. It is an attacker's attack intended to redirect a website's traffic to another, bogus site.
- 16. It is a computer worm targeting the Microsoft Windows operating system.
- 17. It is the action of recording (or logging) the keys struck on a keyboard.
