Across
- 4. Processing data closer to the source, reducing latency and enhancing performance.
- 6. Software that protects against malware and other threats.
- 7. The ability to use and understand information technology effectively.
- 8. Physical components of a computer system, like the monitor, keyboard, and CPU.
- 12. Wireless technology for connecting to the internet.
- 13. Extremely large datasets that require specialized tools for analysis and processing.
- 14. Computer systems that mimic the structure and function of the human brain.
- 15. Creating copies of data to protect against loss or corruption.
- 16. A system of interconnected documents and resources accessible through the internet.
- 17. Technology that creates immersive, interactive experiences
- 18. A global network connecting computers and devices.
- 19. A device that connects multiple devices to a network
Down
- 1. Programs and instructions that tell hardware what to do.
- 2. Protecting computer systems and networks from unauthorized access and threats.
- 3. The process of examining raw data to extract meaningful insights and patterns.
- 5. Storing and accessing data and applications over the internet.
- 7. Presenting data in a visual format to make it easier to understand and interpret.
- 9. Computer systems capable of performing tasks that typically require human intelligence.
- 10. Online platforms for social interaction and content sharing.
- 11. Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.
