Technovation -Play & Conquer

123456789101112131415161718192021222324252627
Across
  1. 4. Numerical identifier uniquely assigned to each device in a network
  2. 7. ML technique grouping data points with similar properties
  3. 9. Statistical technique modeling relationships between dependent and independent variables
  4. 10. Iterative approach to adaptive software development
  5. 11. Integration of software development and IT operations practices
  6. 12. Cyberattack where attackers trick users into revealing sensitive information
  7. 16. Protocol for secure authorization in web applications
  8. 18. ML method for testing model performance using multiple train-test splits
  9. 19. NLP process of splitting text into smaller meaningful units like words or phrases
  10. 22. NLP process of reducing words to base form using vocabulary and grammar
  11. 23. Ensemble learning algorithm using multiple decision trees for classification
  12. 24. Self-replicating malware that spreads across networks
  13. 25. NLP technique reducing words to their root form (e.g., running → run)
  14. 26. Network security system that monitors and controls traffic
  15. 27. Device that forwards data packets between networks
Down
  1. 1. On-demand availability of computing resources over the internet
  2. 2. Malicious software that secretly monitors user activity
  3. 3. Lightweight data-interchange format widely used in web APIs
  4. 5. Extremely large datasets requiring advanced analysis techniques
  5. 6. Malware disguised as legitimate software but performing harmful actions
  6. 8. ML condition where a model is too simple to capture patterns in data
  7. 13. Ensemble ML technique combining weak learners into strong predictors
  8. 14. Hierarchical system mapping human-readable names to IP addresses
  9. 15. ML paradigm where an agent learns through trial and reward feedback
  10. 17. Process of discovering hidden patterns in large datasets
  11. 20. Open-source library widely used for deep learning and ML applications
  12. 21. Distributed and immutable ledger enabling secure transactions