IT Terminology

123456789101112131415161718
Across
  1. 3. Distributed ledger technology with cryptographic linking.
  2. 5. Using scripts or software to perform tasks without manual input.
  3. 6. Project management method using small, iterative steps.
  4. 8. Open-source operating system with many distributions.
  5. 9. Network of malware-infected devices controlled remotely.
  6. 11. Practice of protecting digital assets from threats.
  7. 12. Converting data into unreadable code for protection.
  8. 13. Flooding a network with traffic to disrupt service.
  9. 15. A sequence of instructions used in software tasks.
  10. 16. Low-level code interacting directly with hardware.
  11. 17. On-demand delivery of IT resources over the internet.
  12. 18. Malware that demands payment to unlock encrypted data.
Down
  1. 1. Computers mimicking human cognitive functions.
  2. 2. Professional who interprets data to help decision-making.
  3. 3. Wireless technology for short-distance device communication.
  4. 4. Numeric label identifying devices on a network.
  5. 5. Loss of signal strength in networking cables.
  6. 7. Attempt to infiltrate digital systems maliciously.
  7. 10. Developer who creates the visual interface of websites.
  8. 14. Temporary storage for fast data retrieval.