Across
- 5. A set of rules governing communication between computers on a network.
- 6. A collection of data stored on a computer.
- 7. The person or entity using a computer or system.
- 8. A type of malware that disguises itself as legitimate software.
- 10. Malicious software designed to harm a computer system.
- 12. A unit of digital information, typically 8 bits.
- 14. A series of commands that are executed by a program.
- 17. A peripheral device used to input text and commands into a computer.
- 21. SOURCE Software whose source code is available for modification.
- 22. A computer that provides services or resources to other computers on a network.
- 23. A group of interconnected computers that can share resources.
- 25. A markup language used to store and transport data.
Down
- 1. The process of encoding information to prevent unauthorized access.
- 2. Malicious code that can replicate itself and spread to other systems.
- 3. A program that executes instructions written in a programming language line by line.
- 4. A computer or device on a network that provides services to other devices.
- 9. A high-level, object-oriented programming language.
- 11. A system of interlinked hypertext documents accessed through the internet.
- 13. A version control system commonly used in software development.
- 15. A small, fast memory storage used to store frequently accessed data.
- 16. To identify and fix errors or bugs in a program.
- 18. An ordered set of instructions to perform a task.
- 19. Local Area Network, a network of computers in a limited geographical area.
- 20. A request for information from a database.
- 24. Random Access Memory, temporary data storage for active processes.
