Tech Week Test

1234567891011121314
Across
  1. 3. A program that enables a computer to perform specific tasks.
  2. 4. Step-by-step procedure for solving a problem.
  3. 8. Manipulation of matter on an atomic, molecular, and supramolecular scale.
  4. 10. Authentication techniques based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
  5. 11. Collection of structured information stored in a computer system.
  6. 13. Process of converting information into a code to prevent unauthorized access.
  7. 14. Creation of a virtual version of something, such as an operating system or server.
Down
  1. 1. Wireless networking technology that allows devices to connect to the internet without using cables.
  2. 2. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. 3. Mobile phone with advanced features, such as internet connectivity and app support.
  4. 5. Internet-based computing that provides shared resources and data storage on demand.
  5. 6. Software application used to access and view websites on the internet.
  6. 7. Measures taken to protect computer systems and data from unauthorized access or attacks.
  7. 9. Simulation of human intelligence processes by machines, especially computer systems.
  8. 12. A security system that monitors and controls incoming and outgoing network traffic.