TechCrossword

123456789101112131415161718192021222324252627282930
Across
  1. 2. What technology allows a process to perform multiple tasks concurrently?
  2. 3. Source Computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose.
  3. 5. A technique in web development that allows parts of a page to be updated without a full page reload, enhancing user experience.
  4. 8. Which Java keyword is used to implement multiple inheritance?
  5. 10. Name the first word of the method used to convert a string to a primitive data type in Java?
  6. 13. What is the unique identifier assigned to a specific device on a network?
  7. 14. What is the term for a unique string of characters used to authenticate a user?
  8. 15. What cryptographic protocol secures data transmission over a computer network, commonly used for secure websites?
  9. 18. Functionality Allowing Programs to Run Without Knowing the Underlying Hardware Details
  10. 21. Method used to dynamically change the memory allocation of a previously allocated memory in C
  11. 22. Data Structure Combining Properties of Queue and Stack
  12. 23. Algorithmic Paradigm Focused on Making Locally Optimal Choices
  13. 25. Programming Language Known for its Simplicity and Readability
  14. 26. What is the term for a self-contained, reusable piece of code in programming?
  15. 29. What is the term for the process of finding and fixing errors in a program?
Down
  1. 1. Original company known for developing the Java programming language?
  2. 4. What is the term for a software program designed to cause harm to a computer system?
  3. 6. Java Feature for Automatic Memory Management
  4. 7. Level The highest level of abstraction in DBMS
  5. 9. Which class is the superclass for all exception classes in Java?
  6. 11. What is the fundamental unit of information in computing and digital communications?
  7. 12. What type of attack involves flooding a network or service with an overwhelming amount of traffic?
  8. 16. Which design pattern restricts the instantiation of a class to one single instance?
  9. 17. A type of attack that involves tricking people into revealing confidential information.
  10. 19. A hardware component that temporarily stores frequently accessed data for quicker retrieval.
  11. 20. Synchronization Mechanism Ensuring Mutual Exclusion
  12. 24. What term is used to describe a function that calls itself?
  13. 27. Application that provides comprehensive facilities for software development.
  14. 28. A technology company known for designing and manufacturing graphics processing units (GPUs).
  15. 30. Web-based Source Control System that allows developers to create, store, and manage their code.