Y10 CompSci IGCSE Review for Term 1

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 5. A type of storage that uses magnetism to encode data
  2. 7. A unit of data sent over a network, including payload and routing info
  3. 12. Secure Sockets Layer; a protocol for encrypting internet communication
  4. 13. A unique identifier for network interfaces, used for local communication
  5. 14. Integrated Development Environment; software for writing, testing, and debugging code
  6. 15. A network of remote servers used for storing data and applications
  7. 18. Small pieces of data stored by websites in a user's browser
  8. 19. firmware that initializes hardware during startup
  9. 20. Software that converts high-level programming code into machine code
  10. 22. temporary storage used by a computer during operation
  11. 23. A value used to verify the integrity of data
  12. 25. Devices that detect and respond to changes in the environment
  13. 26. A protocol that defines how data is addressed and routed across networks
  14. 27. A type of storage with no moving parts, such as SSDs
  15. 29. Malicious software that attaches to programs, replicates, and spreads
  16. 30. A type of storage that uses lasers and light to read/write data (e.g., CDs, DVDs)
  17. 32. A subset of artificial intelligence that enables systems to learn from data
  18. 33. Programs designed to perform maintenance tasks on a computer
  19. 34. A self-replicating malware that spreads across networks independently
Down
  1. 1. A communication mode where data can be sent and received simultaneously
  2. 2. A number system based on 10
  3. 3. The actual data in a data packet
  4. 4. The first block in a blockchain, marking the start of a cryptocurrency network
  5. 6. The part of the CPU used to manage and direct data flow in a computer
  6. 8. A specialized computer designed to perform specific tasks within a larger system
  7. 9. non-volatile storage that typically stores firmware
  8. 10. Devices that convert electrical signals into physical movement
  9. 11. Malicious software disguised as a legitimate program or file
  10. 16. an attack where multiple systems overwhelm a target
  11. 17. The use of unique physical traits (e.g., fingerprints, retina scans) for authentication
  12. 21. a hardware component for connecting a computer to a network
  13. 24. A computer system that mimics the decision-making abilities of a human expert
  14. 28. Software that manages computer hardware and software resources
  15. 31. The part of the CPU that performs arithmetic and logical operations
  16. 35. A machine designed to carry out tasks autonomously or semi-autonomously using bots to request multiple requests