Across
- 3. The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can read it.
- 6. A software application designed to perform automated tasks, such as responding to user queries or performing repetitive actions, often used in chatbots and automated systems.
- 9. A global network connecting millions of computers and devices, enabling the sharing and accessing of information.
- 10. A storage area that temporarily holds data to speed up access to frequently used information or reduce load times.
- 13. A real-time text communication method allowing users to send and receive messages instantly over the internet.
- 14. Instructions written in programming languages that tell a computer how to perform tasks or run applications.
- 15. A computer program that is designed for a particular purpose.
- 18. The process of receiving files from the internet or another system to your computer or device.
- 19. An add-on for a software application that extends its capabilities or adds new features.
- 20. A set of icons or buttons on a software interface that provides quick access to common tools and functions.
- 26. A security system that monitors and controls incoming and outgoing network traffic to protect a computer or network from unauthorized access.
- 27. An organized collection of structured data stored electronically, which can be easily accessed, managed, and updated.
- 28. An error or flaw in software or code that causes it to behave unexpectedly or produce incorrect results.
- 29. A collection of data or information stored on a computer, such as documents, images, or videos.
- 30. A group of interconnected computers and devices that can communicate and share resources with each other.
- 34. A set of rules and standards that define how data is transmitted and received over a network.
- 35. A collection of related web pages accessed via the internet, typically containing information, images, and interactive elements.
- 36. Information processed or stored by a computer, such as text, numbers, or images.
- 37. A duplicate copy of important data or files saved to a separate location to prevent loss in case of system failure.
Down
- 1. The component of a computer that temporarily stores data and instructions needed for processing tasks.
- 2. A device that directs data packets between different networks or devices, helping to manage network traffic.
- 4. A small update or fix released to correct issues or vulnerabilities in software.
- 5. A type of cyberattack where attackers attempt to deceive individuals into providing sensitive information, such as passwords or credit card numbers, by pretending to be a trustworthy entity.
- 7. The options and configurations that can be adjusted to customize how a program or device operates.
- 8. To copy or move programs or information to another computer system, especially to the internet or a larger computer.
- 11. A clickable link on a webpage that takes you to another page or website when selected.
- 12. The main screen of a computer interface where you can access and manage files, applications, and settings.
- 16. A collection of programs and applications that instruct a computer on how to perform specific tasks.
- 17. A record of events or activities, often used for tracking and troubleshooting purposes in software and systems.
- 19. A personal account or collection of information about a user, often used to customize settings and preferences.
- 21. A virtual container used to organize and store files on a computer, making it easier to manage them.
- 22. The process of verifying the identity of a user or system, often through credentials such as passwords, biometrics, or security tokens.
- 23. A powerful computer or system that provides resources, data, or services to other computers over a network.
- 24. The physical and electronic parts of a computer, rather than the instructions it follows.
- 25. A horizontal bar at the bottom of a computer screen that shows open applications and provides quick access to functions.
- 28. A software program used to access and view websites on the internet, such as Google Chrome or Firefox.
- 31. Online storage that lets you save and access data and applications over the internet rather than on your local computer.
- 32. The process of entering a username and password to access a computer system, application, or online account.
- 33. A type of malicious software designed to harm or disrupt a computer system or steal information.
