Across
- 3. Programming template that defines common properties and behaviors for creating objects.
- 4. Security weakness that can be targeted to compromise a system.
- 5. Execution of a design or specification through functional code.
- 7. On-screen indicator showing that a system is ready to receive input.
- 9. Closed electrical pathway that allows current to move between components.
- 11. Background service that runs continuously to perform system-related tasks.
- 12. Isolated storage area used to contain suspicious or harmful files.
- 14. Model or conceptual framework that guides system design or programming style.
- 17. Mechanism that selects, transforms, or blocks data based on defined rules.
- 20. Encrypted output generated after transforming readable data.
- 21. Defined region in code where variables and functions are accessible.
- 23. Centralized database that stores configuration settings for an operating system.
- 25. Programming technique where a function solves a task by calling itself.
- 27. Method of dividing a larger network into smaller logical segments.
- 30. Verification process that confirms a user’s identity.
- 32. Impersonation method that falsifies identity or source information.
- 33. Tool that converts symbolic low-level instructions into machine code.
- 34. Material with electrical properties between those of a conductor and an insulator.
- 36. Process that converts data into a fixed-length cryptographic value.
- 41. Programming technique that groups data and functions into a single protected structure.
- 42. Processor technique that allows a single core to manage multiple thread execution paths.
- 45. Unexpected technical fault that causes temporary malfunction.
- 47. Temporary communication state established between systems to exchange data.
- 48. Technology that creates simulated computing environments using physical hardware resources.
Down
- 1. Programming concept that allows different object types to respond uniquely to a shared interface.
- 2. Software component that enables an operating system to communicate with a specific hardware device.
- 6. Deceptive technique that attempts to trick users into revealing sensitive information.
- 7. Variable that holds a memory address instead of a direct value.
- 8. Embedded software stored in hardware to control low-level device operations.
- 10. Structured memory region that stores function frames during program execution.
- 13. Instrument used to measure electrical current in a circuit.
- 15. Fixed-length output produced by a cryptographic compression function.
- 16. Malicious software designed to damage, disrupt, or gain unauthorized access to systems.
- 18. Assurance that data remains accurate, consistent, and unaltered.
- 19. Text-based interface used to interact with a system through commands.
- 20. Remote computing environment that provides on-demand access to hosted resources.
- 22. Digital document that verifies identity using cryptographic credentials.
- 24. System design approach that duplicates critical components to ensure reliability.
- 26. Software mechanism that transfers data sequentially from one process to another.
- 28. Wired communication standard used for local area data transmission.
- 29. Special routine that initializes a newly created object.
- 31. Miniaturized electronic component containing integrated circuitry.
- 35. Conductive element that transfers electrical energy between a device and its environment.
- 37. Software tool that performs a focused maintenance or system management function.
- 38. Network device that directs data packets between separate networks.
- 39. Continuous flow of data transmitted or processed in a specific order.
- 40. Structured arrangement of devices and connections within a network.
- 43. Technique that leverages a system weakness to gain unauthorized control.
- 44. Electrically operated switch used to control a circuit with minimal input power.
- 46. Temporary storage area used to handle differences in data processing speed.
