IT theme

123456789101112131415
Across
  1. 4. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  2. 5. A secret word or phrase that must be used to gain admission to something.
  3. 8. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  4. 9. The physical components of a computer system.
  5. 11. The process of converting information or data into a code, especially to prevent unauthorized access.
  6. 12. The maximum rate of data transfer across a given path.
  7. 13. The central part of an operating system, managing system resources and communication between hardware and software.
  8. 15. A set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Down
  1. 1. A programming language commonly used in web development.
  2. 2. A point where two systems, subjects, organizations, etc., meet and interact.
  3. 3. A type of computing that relies on sharing computing resources rather than having local servers handle applications.
  4. 6. A small, portable personal computer with a screen and keyboard.
  5. 7. A group of interconnected computers.
  6. 10. An organized collection of data, generally stored and accessed electronically from a computer system.
  7. 14. A unit of information equal to one billion bytes.