Across
- 5. I outline logic without the syntax, a plan before the code, simple and clear
- 7. I’m software built into hardware, hard to change but essential to start. What am I?
- 8. ...?
- 9. I roam the streets, seeking signals from afar, looking for networks, whether near or far.
- 10. I lure you in with a tempting link, but I steal your secrets with just one click
- 12. I protect your screen when you're away, keeping it lively with colors at play. What am I?
- 13. I repeat a task until it’s done, running through steps, over and over again
Down
- 1. I hold data temporarily, before it's used or moved, part of the cycle where instructions are proved.
- 2. I sense touch with a gentle press, using electricity to make the screen express
- 3. I am a malicious cyberattack used to bring down several large servers using countless networks as my 'bots'
- 4. I make your processor run faster than intended, pushing limits for more speed.
- 6. I measure the flow of data, wide or small, the faster I am, the quicker you call
- 10. I change addresses behind the scenes, sending you to fake sites where your data is seen
- 11. I’m a set of rules, often strict and true. I dictate how machines talk to you.
