Across
- 1. practice of protecting critical systems and sensitive information from digital attacks
- 3. provides a secure and transparent way to record and verify transactions. It is commonly associated with cryptocurrencies but has broader applications, such as supply chain management and secure data sharing.
- 5. involves the use of software robots to automate repetitive and rule-based tasks. It helps streamline business processes, reduce errors, and increase operational efficiency.
- 8. technology enhances user experiences by creating immersive virtual environments
- 9. provides faster and more reliable connectivity, enabling the seamless operation of applications that require high data transfer speeds
- 10. enable systems to learn from data and make intelligent decisions.
Down
- 2. involves processing data closer to the source of generation rather than relying solely on centralized cloud servers.
- 4. involves connecting physical devices to the internet, allowing them to collect and exchange data
- 6. enable the processing and analysis of large volumes of data to derive insights and make informed business decisions.
- 7. provides scalable and flexible resources, allowing organizations to store and access data, run applications, and deploy services without the need for on-premises infrastructure