RU ITEC421 Degradation Faults in Computing

1234567891011121314151617181920
Across
  1. 2. Programs, applications, and instructions that run on a computer system, encompassing operating systems, utilities, applications, and other software components that enable user interaction and system functionality.
  2. 4. A network of remote servers hosted on the internet that enables on-demand access to computing resources, storage, and applications, allowing users to store, manage, and process data remotely.
  3. 7. The creation of a virtual version or representation of computing resources, such as servers, storage devices, or networks, using virtualization software to optimize resource utilization and flexibility.
  4. 9. A network segmentation technique that allows multiple logically separate networks to coexist and communicate over a single physical network infrastructure, enabling better network management, security, and traffic control.
  5. 10. A standard protocol used for sending and relaying email messages between email servers over a TCP/IP network, facilitating the transmission of electronic mail across the internet.
  6. 11. A security system designed to prevent unauthorized access to or from a private network.
  7. 12. Programs, applications, and instructions that run on a computer system, encompassing operating systems, utilities, applications, and other software components that enable user interaction and system functionality.
  8. 13. A secure network connection established over a public network, such as the internet, that encrypts data traffic between the user's device and a remote server, ensuring privacy and anonymity online.
  9. 15. The hardware component of a computer system used to store data and instructions temporarily or permanently for immediate access by the CPU during program execution.
  10. 16. A software tool that translates source code written in a high-level programming language into machine code instructions that a computer can understand and execute.
  11. 18. A small, high-speed storage area used to temporarily hold frequently accessed data.
  12. 19. A decentralized hierarchical system used to translate domain names (e.g., www.example.com) into IP addresses, allowing users to access websites using human-readable names.
  13. 20. A set of networking techniques and protocols used to prioritize and manage network traffic based on predefined criteria, such as bandwidth, latency, packet loss, and jitter, to ensure optimal performance and reliability for critical applications.
Down
  1. 1. Physical components of a computer system, such as the processor, memory, motherboard, and peripherals.
  2. 3. The process of encoding data to make it unreadable without the correct decryption key.
  3. 5. A networking device responsible for directing data packets between computer networks, facilitating communication and ensuring data reaches its intended destination efficiently.
  4. 6. Firmware stored on a computer's motherboard that initializes hardware components and performs low-level system functions, such as booting the operating system and configuring hardware settings.
  5. 8. A group of interconnected computers, devices, or systems that can communicate and share resources, such as data, files, and devices, using wired or wireless connections.
  6. 12. A computer system or software application that provides resources, services, or data to other computers or clients on a network, facilitating communication and data sharing.
  7. 14. A set of rules or standards governing the format and transmission of data between devices or systems in a network, ensuring consistent and reliable communication.
  8. 17. The central processing unit (CPU) of a computer system responsible for executing instructions, performing calculations, and managing data flow within the system.