Across
- 4. Malicious software designed to harm or exploit any device.
- 5. A wireless networking technology.
- 6. The physical components of a computer.
- 8. A person who uses computers to gain unauthorized access to data.
- 13. A device that forwards data packets between computer networks.
- 14. A device that displays visual output from a computer.
- 16. The practice of protecting systems, networks, and programs from digital attacks.
- 18. A small piece of data sent from a website and stored on the user's computer.
- 19. A machine that performs tasks according to a set of instructions.
- 20. A global network connecting millions of computers.
Down
- 1. A security system that controls incoming and outgoing network traffic.
- 2. A storage medium that uses flash memory.
- 3. A portable computer.
- 7. A collection of data stored in a structured way.
- 9. Temporary memory that a computer uses to store data for quick access.
- 10. An input device used to type text and commands.
- 11. The process of converting data into a code to prevent unauthorized access.
- 12. The brain of the computer that processes instructions.
- 15. A set of instructions that tells the hardware what to do.
- 17. The process of starting a computer.
