1 | 16 | 17 | |||||||||||||||||||||||
2 | 18 | ||||||||||||||||||||||||
14 | 3 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. Software used to detect and prevent computer viruses and other malicious software.
2. An interface that allows a user to interact with an operating system or program by typing commands into a terminal or console.
3. The ability to access and control a computer or network remotely, usually through the internet.
4. A GUI feature that allows users to move files, folders, and other graphical elements by selecting and dragging them with a mouse or touchpad
5. A software component that allows an operating system to communicate with and control a specific hardware device.
6. Copying an entire hard drive to another hard drive while preserving data and file structure.
7. A section of a hard drive that is treated as a separate storage device by the operating system.
8. A situation in which two or more processes are unable to proceed because each is waiting for another to release a resource.
9. A type of application software used for managing customer relationships and interactions.
10. A type of software used for accessing and viewing websites on the internet.
11. Software used to detect and remove spyware and other forms of malware from a computer system.
12. A type of application software used for organizing, analyzing, and presenting data in tabular form.
13. An instance of a program in execution, including its current state and resources.
14. Interactive digital games played electronically on various platforms such as consoles, computers, or mobile devices.
15. Software used to simulate real-world scenarios or processes, often for testing or training purposes.
16. A software or feature that allows a user to view and control a desktop environment on a remote computer.
17. A type of software used for creating and managing virtual machines on a computer or server.
18. Software used to secure data by converting it into a coded format that can only be accessed by authorized users.