The Giant Tech Cross-Word

1234567891011121314151617181920212223242526272829
Across
  1. 5. A sequence of instructions which is given a name and can be executed anytime as well as any number of times
  2. 6. A+B+C+D+E+F
  3. 7. A data type that has two possible values: “true” and “false”
  4. 8. The fundamental unit of a digital image
  5. 9. A coded algorithm having ability to be executed by a machine
  6. 12. Is a detailed, yet readable, description of what a computer program or algorithm must do, expressed in languages that humans use naturally
  7. 13. Use to run CPU at a faster speed
  8. 14. The service responsible for mapping human names of webpages to computer names of webpages
  9. 16. Calling oneself from within oneself
  10. 18. A network security system, either hardware or software based, that controls incoming or outgoing traffic based on set of predefined rules
  11. 21. A repetitive action or command typically created with programming loops
  12. 22. Cryptocurrency is based on
  13. 23. string s = "ACDS"; for(int i=0;i<3;i++) cout<<s[++i];
  14. 25. Logic gate which gives high when both inputs are opposite
  15. 26. Software designed to detect and destroy malicious programs
  16. 27. Unprocessed Information
  17. 28. A name one makes up in order to see or perform things on a website
  18. 29. Smallest unit of memory
Down
  1. 1. Small area of a very fast memory in CPU
  2. 2. The process of fooling an online account holder in giving certain information by pretending as legitimate firm
  3. 3. Alternate address/name for calling a web page (different from the one which computer uses internally)
  4. 4. A system of interactive visual components for computer software
  5. 10. A number assigned to any item that is connected to the Internet
  6. 11. Amazon started by selling only this product
  7. 15. Interface Between Computer Software and Hardware
  8. 17. In SQL databases, we fetch information by making a ________
  9. 19. A way of representing information using only two options
  10. 20. The process of converting information into code to prevent unauthorised access
  11. 22. Group of malicious programs leveraging the functionality of combination of virus, worms, backdoors etc.
  12. 24. A program that converts instructions into a machine-code or lower-level form so that they can be read and executed by a computer