Across
- 3. A program that enables a computer to perform specific tasks.
- 4. Step-by-step procedure for solving a problem.
- 8. Manipulation of matter on an atomic, molecular, and supramolecular scale.
- 10. Authentication techniques based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
- 11. Collection of structured information stored in a computer system.
- 13. Process of converting information into a code to prevent unauthorized access.
- 14. Creation of a virtual version of something, such as an operating system or server.
Down
- 1. Wireless networking technology that allows devices to connect to the internet without using cables.
- 2. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- 3. Mobile phone with advanced features, such as internet connectivity and app support.
- 5. Internet-based computing that provides shared resources and data storage on demand.
- 6. Software application used to access and view websites on the internet.
- 7. Measures taken to protect computer systems and data from unauthorized access or attacks.
- 9. Simulation of human intelligence processes by machines, especially computer systems.
- 12. A security system that monitors and controls incoming and outgoing network traffic.