Across
- 3. A wireless technology standard for exchanging data over short distances.
- 8. Digital currency in which encryption techniques are used.
- 11. A network security system that monitors and controls incoming and outgoing network traffic.
- 13. Programs and other operating information used by a computer.
- 14. A computer that manages access to a centralized resource or service.
- 16. Unsolicited messages sent over the internet.
- 19. The physical components of a computer.
- 21. A malicious software program that replicates itself.
- 22. A locator for an address on the internet.
- 24. A step-by-step procedure for solving a problem.
- 25. A global network of interconnected computers.
Down
- 1. Software that is intended to damage or disable computers.
- 2. Intelligence The simulation of human intelligence processes by machines.
- 4. Measures taken to protect a computer or network from unauthorized access.
- 5. A collection of information stored electronically.
- 6. A local area wireless technology that allows electronic devices to exchange data.
- 7. A document stored on the internet.
- 9. Storing and accessing data over the internet instead of on local servers.
- 10. A group of computers connected together to share resources.
- 12. The maximum rate of data transfer across a network.
- 15. A device that forwards data packets along networks.
- 17. Reality An immersive computer-generated environment.
- 18. The process of converting information into a secure format.
- 20. Information processed or stored by a computer.
- 23. The smallest unit of a digital image.
