Across
- 6. Rechargeable battery used to power a laptop.
- 10. Protection of computer systems and networks from theft or damage.
- 13. Latest version of USB used for connecting devices to a computer.
- 14. Online meeting conducted using Zoom video conferencing software.
- 15. Network security system that monitors and controls incoming and outgoing network traffic.
- 17. Two dimensional barcode used for storing information.
- 22. Display screen that responds to touch input.
- 24. Networking device that forwards data packets between computer networks.
- 26. Small application designed to run within a web browser.
- 29. Unit of digital image resolution equal to one million pixels.
- 30. Programming language used to create interactive web pages.
- 32. Settings for configuring a firewall.
- 33. Video sharing platform.
- 35. Portable storage device that uses USB technology.
- 39. Software used for creating and managing backups of data or files.
- 40. Software that securely stores and manages passwords.
- 41. Portable computer designed for use on a lap or desk.
- 43. Protection of internet connected devices from threats and attacks.
- 48. Software used to access and view websites on the internet.
- 53. Software that manages computer hardware and software resources.
- 55. Input device used to type text and commands into a computer.
- 58. Portable computer designed for use on a lap or desk.
- 59. Branch of physics that studies the behavior of matter and energy at the quantum level.
- 61. Network of physical devices, vehicles, and other objects connected to the internet.
- 62. Software that reads and interprets XML documents.
- 63. Process of creating and restoring backups of data or files.
- 64. Design, construction, and operation of robots.
- 67. Mathematical formula used for encrypting and decrypting data.
- 70. Delivery of computing services over the internet.
- 73. Physical or logical arrangement of network devices and connections.
- 74. Software that can perform tasks or provide information in response to voice commands.
- 75. Simulation of human intelligence in machines.
- 77. Measure of the effectiveness of a password in preventing unauthorized access.
- 78. Mobile phone with advanced computing capabilities.
- 79. Process of analyzing large sets of data to discover patterns and relationships.
- 80. Protection of computer networks from unauthorized access or attacks.
- 81. Integration of digital information with the physical environment.
Down
- 1. Software designed to harm or disrupt computer systems.
- 2. Online platforms for sharing information and connecting with others.
- 3. Universal Serial Bus used for connecting devices to a computer.
- 4. Network security system that monitors and controls incoming and outgoing network traffic.
- 5. Head mounted display used for virtual reality experiences.
- 7. Design and development of robots and robotic systems.
- 8. Display screen that responds to touch input.
- 9. Set of instructions for solving a problem or completing a task.
- 11. Extensible Markup Language used for storing and transporting data.
- 12. Input device used to control the movement of a cursor on a computer screen.
- 16. Process of analyzing and interpreting data to gain insights and make decisions.
- 18. Account on YouTube used for uploading and sharing videos.
- 19. Representation of data in visual form, such as charts or graphs.
- 20. Set of instructions for controlling network traffic.
- 21. Programming language used for developing applications and software.
- 23. Hypertext Markup Language used to create web pages.
- 25. Use of GPS technology for tracking the location of a person or object.
- 27. Arrangement of keys on a keyboard.
- 28. Unit of digital information equal to one billion bytes.
- 31. Video uploaded to YouTube for sharing and viewing.
- 34. Combination of keys used to perform a specific task.
- 36. Global Positioning System used for navigation and location tracking.
- 37. Social media platform for sharing photos and videos.
- 38. Set of rules for validating XML documents.
- 42. Secret code used to access a computer or online account.
- 44. Group of interconnected devices and computers.
- 45. Process of converting data into a code to prevent unauthorized access.
- 46. Online seminar conducted using Zoom video conferencing software.
- 47. Process of removing malware from a computer system.
- 48. Wireless networking technology that uses radio waves to provide high speed internet and network connections.
- 49. Use of social media platforms for marketing and advertising.
- 50. Latest version of HTML used for creating web pages.
- 51. Computer generated simulation of a three dimensional environment.
- 52. Use of GPS technology for navigation and location tracking.
- 54. Code used to encrypt and decrypt data.
- 56. Backup of data or files stored in the cloud.
- 57. Use of quantum mechanical phenomena to perform computing tasks.
- 60. Process of creating and maintaining websites.
- 65. Purchasing goods or services over the internet.
- 66. Copy of data or files made in case the original is lost or damaged.
- 68. Conducting banking transactions over the internet.
- 69. Online storage service for data and files.
- 71. Software used for creating and editing HTML code.
- 72. Wireless communication technology for short range data exchange.
- 76. Video conferencing software.