PC.

1234567891011121314151617181920
Across
  1. 4. Malicious software designed to harm or exploit any device.
  2. 5. A wireless networking technology.
  3. 6. The physical components of a computer.
  4. 8. A person who uses computers to gain unauthorized access to data.
  5. 13. A device that forwards data packets between computer networks.
  6. 14. A device that displays visual output from a computer.
  7. 16. The practice of protecting systems, networks, and programs from digital attacks.
  8. 18. A small piece of data sent from a website and stored on the user's computer.
  9. 19. A machine that performs tasks according to a set of instructions.
  10. 20. A global network connecting millions of computers.
Down
  1. 1. A security system that controls incoming and outgoing network traffic.
  2. 2. A storage medium that uses flash memory.
  3. 3. A portable computer.
  4. 7. A collection of data stored in a structured way.
  5. 9. Temporary memory that a computer uses to store data for quick access.
  6. 10. An input device used to type text and commands.
  7. 11. The process of converting data into a code to prevent unauthorized access.
  8. 12. The brain of the computer that processes instructions.
  9. 15. A set of instructions that tells the hardware what to do.
  10. 17. The process of starting a computer.