Terminology D

Edit Answers
HDMBASJNFPOGILKCAFWR CEADUDIETZQUACDFDHRN CCPRARTAELYDCRCGAVOO DIDQKTDOTVIOWEDETQTI AVIEVWAGALJNAVADEYCT TRMEFYEMCQCGOIGIRDEA AEMSDAWBIXULPRNVDEJD CSKAENUYFNQEIDIIOFOI OFKBEBJLIUISZEDDMRRL RO3APSOUTISNMCOLAAPA RLTTFMLDRH3GGICAIGAV UIFAABDEEUCLWVNTNMTA PAEDKDLPCNQXDEEINEAT TNHNEQXOLSXQJDAGANDA IETSEVYSA3JOACTIMT3D ODAUAOJITCDDR3ADEAOV NITKKIXTIJNMXWDWDTHA JPASKYYOGPZLEGYRZIET KDDLQD3RIDECRYPTIONA TUJXNPQYDOXINGNKQNGD
1.
online websites not accessible using traditional browsers or search engines
2.
unprocessed pieces of digital information
3.
collection of indexed information in a structured format
4.
when a file is no longer readable by any application and becomes unusable
5.
a process whereby data is reduced to its most basic form of binary code for the purpose of storage and transmission to other applications or computers
6.
analyzing large amounts of data for hidden patterns or relationships
7.
device capable of receiving video input and projecting it onto a screen.
8.
when information such as passwords, confidential data, personal or corporate information is obtained illegally
9.
to ensure that data entered into a database is valid or to eliminate the change of entering erroneous data
10.
function that shows the date as a number in serial format
11.
an application with the primary purpose of managing a database
12.
when a number of infected computers called a botnet, performs simultaneous requests on the same website to overwhelm the server to the point of causing it to crash
13.
a type of random-access memory that is twice as fast as the older SDRAM
14.
a new specification of RAM that provides high speed data transfer
15.
process of reverting a file back to a computer readable state
16.
videos and multimedia that has been edited with the use of AI to swap a person's face with another
17.
pre-selected option to assist in data entry or selection.
18.
finding all scattered parts of files and putting them together on a HDD
19.
storage location for important files, often with security features in place to protect the data as it may contain confidential information.
20.
software that allows a computer to interact and control devices that has been connected to the computer.
21.
certification of an organisations online identity and security policies
22.
difference between those who have access to mainstream technologies and those who do not
23.
a small circuit board containing RAM chips.
24.
a directory for Internet Protocols
25.
registered name on the internet for a user to host web pages
26.
small device that connects to a computer to act as a functional extension for wireless receivers
27.
gathering personal or private information on individuals and then posting that information online
28.
a method of measuring print density