Across
- 3. - Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 4. - A network security system that monitors and controls incoming and outgoing network traffic.
- 7. - A hardware or software component that stores data so future requests for that data can be served faster.
- 9. - A unit of digital information storage equal to approximately one billion bytes.
- 12. - A step-by-step procedure for solving a problem or accomplishing a task.
- 14. - A set of rules governing the exchange or transmission of data between devices.
- 15. - The maximum rate of data transfer across a given path.
Down
- 1. - A point in a network or diagram at which lines or pathways intersect or branch.
- 2. - A programming language commonly used to create interactive effects within web browsers.
- 5. - The process of finding and fixing errors in software code.
- 6. - A shared boundary across which two or more separate components of a computer system exchange information.
- 8. - The process of converting information or data into a code to prevent unauthorized access.
- 10. - The delay before a transfer of data begins following an instruction for its transfer.
- 11. - The core part of an operating system, managing system resources and communication between hardware and software.
- 13. - A reference to data that the reader can directly follow by clicking.
