computer Crossword Puzzles
Kelsey W. Period 2 2024-11-07
Across
- a short-range wireless connection between two devices
- network that allows devices to connect to the internet
- to send data
- the inside of the computer case
- to transfer data from a website to a device
- a computer image file that supports both animated and static images
- a way to save data securely so it can be accessed any time and anywhere
- a piece of the computer that displays text
Down
- a tool to access websites and the internet
- a Microsoft online cloud storage
- an area in a web page where it will transport the user to another web page
- to transfer data from a computer to the internet or distance device
- Name of web page
- used to connect computers with peripheral devices
- a computer file for the compression and storage of images
15 Clues: to send data • Name of web page • the inside of the computer case • a Microsoft online cloud storage • a tool to access websites and the internet • a piece of the computer that displays text • to transfer data from a website to a device • used to connect computers with peripheral devices • a short-range wireless connection between two devices • ...
Computer Crossword Search - Michael K 2019-02-07
Across
- store data
- panel of keys
- used to cool of fan
- used to carry out the sound
- hearing audio
- displays onto the monitor
- used to connect exterior devices
Down
- heart of the computer
- saves data
- used for the mouse
- used to read and save
- carries out the actions
- used for random memory
- to see the computer
- used ti print off the computer
15 Clues: saves data • store data • panel of keys • hearing audio • used for the mouse • used to cool of fan • to see the computer • heart of the computer • used to read and save • used for random memory • carries out the actions • displays onto the monitor • used to carry out the sound • used ti print off the computer • used to connect exterior devices
BROWSING SAFELY 2025-05-25
Across
- CONDUCT TERRORISM THROUSH COMPUTER
- ONE TYPE OF VIRUS
- ATTACK COMPUTER AND FORCE FOR PAY MONEY
- PROTECT FROM VIRUS
- A SET PROGRAM DISTRUBS THE NORMAL FUNCTION
- CREATE IMPRESSION IF YOU ENGASE ONLINE
- ILLEGAL ENTRY INTO COMPUTER
- MISLEADING MESSAGES
- ONLINE AN PHYSICAL SENUAL ABUSE
Down
- ANY CRIMINAL ACTIVITY
- WHO CONDUCT HACKING
- INSULTING AN THREATENING MESSAGE
- AUTOMETED TELLER MACHINE
- MISLEADING EMAILS
- ONE TIME PASSWARD
15 Clues: ONE TYPE OF VIRUS • MISLEADING EMAILS • ONE TIME PASSWARD • PROTECT FROM VIRUS • WHO CONDUCT HACKING • MISLEADING MESSAGES • ANY CRIMINAL ACTIVITY • AUTOMETED TELLER MACHINE • ILLEGAL ENTRY INTO COMPUTER • ONLINE AN PHYSICAL SENUAL ABUSE • INSULTING AN THREATENING MESSAGE • CONDUCT TERRORISM THROUSH COMPUTER • CREATE IMPRESSION IF YOU ENGASE ONLINE • ...
What is a computer? 2015-01-11
Across
- The main computer in a network (S)
- The computer is this type of device (E)
- Another word for programs (S)
- You can carry this computer around (L)
- Personal Computer written in short (P)
Down
- The largest network in the world (I)
- A computer with a touchscreen and no keyboard (T)
- The parts of the computer that you can touch (H)
- A computer that is placed on a desk (D)
- This is processed by the computer (D)
10 Clues: Another word for programs (S) • The main computer in a network (S) • The largest network in the world (I) • This is processed by the computer (D) • You can carry this computer around (L) • Personal Computer written in short (P) • The computer is this type of device (E) • A computer that is placed on a desk (D) • The parts of the computer that you can touch (H) • ...
Computer Crossword Puzzle 2020-09-25
Across
- External storage.
- Random access memory.
- magnetic disk storage.
- Used to type.
- Used by the cashier.
- electro-mechanical data storage.
- Used to print.
- Instructions a computer needs to follow.
Down
- The brain of the computer.
- Output device.
- Read only memory.
- The main circuit board of a computer.
- Used to select things.
- Used to talk.
- Solid State Drive.
- Output device.
16 Clues: Used to talk. • Used to type. • Output device. • Output device. • Used to print. • External storage. • Read only memory. • Solid State Drive. • Used by the cashier. • Random access memory. • magnetic disk storage. • Used to select things. • The brain of the computer. • electro-mechanical data storage. • The main circuit board of a computer. • Instructions a computer needs to follow.
4 2025-10-14
Across
- work place
- important paper
- work friend
- to print something
- worker
- typing device used with computer
- you meet up to apply for jobs
Down
- a job
- boss
- laptop
- an organization or enterprise engaged in commercial, industrial, or professional activities to produce and sell goods or services for profit
- someone handling finances
- computer
- webpage
- a work to do like group what?
15 Clues: boss • a job • laptop • worker • webpage • computer • work place • work friend • important paper • to print something • someone handling finances • a work to do like group what? • you meet up to apply for jobs • typing device used with computer • an organization or enterprise engaged in commercial, industrial, or professional activities to produce and sell goods or services for profit
Vocab Lesson 1 2019-09-18
Across
- Random Access Memory
- Read Only Memory
- computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information.
- such a program for use on the World Wide Web.
- operation of a machine or system, especially an automatic control
- other machines on a network
- Digital Technology. a software program that allows the user
- Computing a computer or program that supplies data or resources
Down
- A computer program with an interface, enabling people to
- Uniform Resource Locator
- A electronic device
- A device or arrangement for observing, detecting, or recording
- Computers. a collection of related data or program records stored on some input/output or auxiliary storage medium:
- Telecommunications, Computers. a system containing any combination
- the computer as a tool to accomplish a specific task.
15 Clues: Read Only Memory • A electronic device • Random Access Memory • Uniform Resource Locator • other machines on a network • such a program for use on the World Wide Web. • the computer as a tool to accomplish a specific task. • A computer program with an interface, enabling people to • Digital Technology. a software program that allows the user • ...
Thomas's hardware crossword puzzle 2019-01-10
Across
- a form of dvd that has a high definition video
- This is the brain of the computer most calculations take place here
- Stores data and is permanently there
- apples own computer
- Its a phone combined with a computer it includes networking features
- A input device that will input whatever letter number or symbol you press
- A type of printer that will use a laser instead of ink
- Lets the computer manipulate and output sound
Down
- gives users 8.5GB of recording space
- A hardware that is'nt a essential part of the computer
- This is a chip that contains the CPU
- Attaches to the usb for transport of data
- the computer's main circuit it usually holds all other hardware
- This is an output device that lets you see what your doing
- this stores memory temporarily
15 Clues: apples own computer • this stores memory temporarily • gives users 8.5GB of recording space • This is a chip that contains the CPU • Stores data and is permanently there • Attaches to the usb for transport of data • Lets the computer manipulate and output sound • a form of dvd that has a high definition video • A hardware that is'nt a essential part of the computer • ...
Computer science vocabulary 2024-08-20
Across
- An algorithm that has been coded into something that can be run by a machine
- component that processes graphics
- often shortened to “app”-a series of codes that allow specific tasks to happen.
- An error or mistake in the program
- to break a problem
- The area where you drag and drop commands to build your program
- Programs or apps
Down
- “bit”) is the smallest information piece on a computer; either a 1 or 0
- Someone who writes code
- the physical hard parts of a computer
- A list of steps to finish a task
- the language that tells the computer what to do
- another word for repetition or doing something over and over again
- component that holds memory temporarily until the computer powers off
- this causes the computer to do the commands you’ve written
15 Clues: Programs or apps • to break a problem • Someone who writes code • A list of steps to finish a task • component that processes graphics • An error or mistake in the program • the physical hard parts of a computer • the language that tells the computer what to do • this causes the computer to do the commands you’ve written • ...
Computer science vocabulary 2024-08-20
Across
- component that processes graphics
- The area where you drag and drop commands to build your program
- A list of steps to finish a task
- Someone who writes code
- this causes the computer to do the commands you’ve written
- another word for repetition or doing something over and over again
Down
- the physical hard parts of a computer
- often shortened to “app”-a series of codes that allow specific tasks to happen.
- component that holds memory temporarily until the computer powers off
- Programs or apps
- to break a problem
- “bit”) is the smallest information piece on a computer; either a 1 or 0
- An error or mistake in the program
- An algorithm that has been coded into something that can be run by a machine
- the language that tells the computer what to do
15 Clues: Programs or apps • to break a problem • Someone who writes code • A list of steps to finish a task • component that processes graphics • An error or mistake in the program • the physical hard parts of a computer • the language that tells the computer what to do • this causes the computer to do the commands you’ve written • ...
Robot Domination 2023-03-29
Across
- program that understands language and completes tasks
- computer ability to perform human tasks
- software that supports a computer's basic function
- identification of the content of a picture by analyzing pixels
- automatically operated machine that replaces human effort
- process of translating content to a different language without any human input
Down
- computer program designed to simulate conversation with humans
- speech generated by a computer
- technology capable of matching a human face against a database of faces
- equipment that operates in response to a person's voice
- prototype that represents all or nearly all of the functionality of the final product
- computer analysis of the human voice
- unfinished version of a program available for testing
- system that converts normal language text into speech
- system that converts normal speech into text
15 Clues: speech generated by a computer • computer analysis of the human voice • computer ability to perform human tasks • system that converts normal speech into text • software that supports a computer's basic function • program that understands language and completes tasks • unfinished version of a program available for testing • ...
Computer Parts Crossword 2021-10-15
Across
- A device that allows you to move a cursor on your monitor.
- Something that executes a certain task.
- A board that links numerous components together.
- A component that can execute operations in
- A device that prints designs and texts onto a page.
- A device that emits sound when told to.
- A device that can read CDs/DVDs ram Data that is currently running on a computer.
- A component that changes the display on a monitor.
Down
- A device that provides power to a computer.
- A device that allows you to type words.
- A disk that contains data.
- An electronic machine that can process data.
- A device that displays what you're doing on a computer.
- Something that allows you to browse the internet.
- A collection of data that the computer is currently running.
15 Clues: A disk that contains data. • A device that allows you to type words. • Something that executes a certain task. • A device that emits sound when told to. • A component that can execute operations in • A device that provides power to a computer. • An electronic machine that can process data. • A board that links numerous components together. • ...
TECHNOLOGY VOCABULARY 2021-04-19
Across
- fix a computer program piecemeal until it works
- the part of a computer that does most of the data processing
- unwanted e-mail
- the process in which output of a system is returned to input
- a security system preventing access to a computer or network
- a unit of information equal to 1000 megabytes or 10^9 bytes
- the organization of data according to preset specifications
- cause to load and start the initial processes
Down
- a compact disk that is used with a computer
- software that is provided without charge
- any small compartment
- a list of questions that are frequently asked (about a given topic) along with their answers
- transfer a file or program to a smaller compute
- a specific size and style of type within a type family
- a restricted computer network
- the organization of data according to preset specifications
16 Clues: unwanted e-mail • any small compartment • a restricted computer network • software that is provided without charge • a compact disk that is used with a computer • cause to load and start the initial processes • fix a computer program piecemeal until it works • transfer a file or program to a smaller compute • a specific size and style of type within a type family • ...
Carlos 2024-12-16
Across
- computer network connected without the use of wires or cables
- that is too much or comes too fast to process at one time
- presented in a useful form
- information within a particular business or industry
- integrated technology that assists with an organizations information management needs
- by which an organization accounts are records are verified
- the requirements of the law
- process of accessing processing and maintaining
Down
- among alternatives
- information that belongs to an organization and cannot be released to the public
- email that the recipient did not request also known as unsolicited commercial email
- access to a computer system
- assistance from outside organization consultants to obtain goods or services to accomplish business objectives or perform primary business activities
- and figures
- programs that download to your computer or network without your permission programs designed to disrupt computer operations
15 Clues: and figures • among alternatives • presented in a useful form • access to a computer system • the requirements of the law • process of accessing processing and maintaining • information within a particular business or industry • that is too much or comes too fast to process at one time • by which an organization accounts are records are verified • ...
Computar Terms Sapphira Joo 2024-10-11
Across
- a storage medium that is used to store memory permanently and cannot be changed (holds programs and boot up information)
- any set of instructions or commands that tell a computer what to do
- an electronic device that has the ability to store, retrieve, and process data
- the brain of the computer that controls all other parts and carries out commands
- lets you use your mouse to click icons, buttons, and menus displayed on the screen
Down
- any part of the computer that you can physically touch; the parts that make up the computer
- series of commands
- where your software, documents, and other files are stored
- the computer's main circuit board that holds the CPU, memory, connectors, cards, and connections to your computer's ports.RandomAccessMemory short-term memory, it temporarily stores the data until it is needed
- a tool you use to access the internet (Google Chrome, Safari, Internet Explorer, Edge, Firefox)
- software that allows you to perform a specific task
- manages the computer's memory and processes and its software and hardware (Windows, MacOS, Linux, iOS, Android)
- any hardware receives data from a computer (printer, monitor, speaker, headphones)
- two digits used to represent information using electricity; ones and zeros
- any hardware that sends data to a computer (mouse, keyboard, touch screen, webcam, microphone)
15 Clues: series of commands • software that allows you to perform a specific task • where your software, documents, and other files are stored • any set of instructions or commands that tell a computer what to do • two digits used to represent information using electricity; ones and zeros • an electronic device that has the ability to store, retrieve, and process data • ...
Cyber security 2022-12-26
Across
- Hardware or software designed to prevent unauthorized access to or from a private network
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- When someone sends an email with a link to a bogus website, it is called.....
- Software ..... is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation of software products or unauthorized versions of software products
- Software programs that protect your computer from internet virus and malicious code
- Threating behavior facilitated through electrical means such as texting
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information
Down
- ..... force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
- Malicious program that uses a computer network to replicate
- Fraudulent phone calls
- Harmful computer programs such as viruses, worms and trojans used by hackers to gain access to your computer and cause destruction
- You should not just check identity, you should also confirm.....
- The process of taking plain text and scrambling it into an unreadable format
- Malicious computer code that reproduce itself
- This can slow down your computer and watch everywhere you go
15 Clues: Fraudulent phone calls • Malicious computer code that reproduce itself • Malicious program that uses a computer network to replicate • This can slow down your computer and watch everywhere you go • You should not just check identity, you should also confirm..... • Threating behavior facilitated through electrical means such as texting • ...
CCS101 Final Exam 2022-12-04
Across
- brain of the computer
- refers to the collection of physical parts of a computer system that we can touch or feel.
- Is your system's short-term memory.
- is the backbone that ties the computer’s components together at one spot and allows them to talk to each other. Without it, none of the computer pieces could interact.
- The memory from which we can only read but cannot write on it.
- Allows you to add various types of expansion cards.
- It is a collection of programs designed to operate, control, andextend the processing capabilities of the computer itself.
Down
- software products are designed to satisfy a particular need of a particular environment.
- A peripherals devices that are not housed inside the computer system.
- Its an object that absorbs heat from the CPU.
- It is where your software, documents, and other files are stored.
- Is a high-speed internal connection used to send control signals and data between the processor and other components.
- The instructions that tell the computer what to do and how to do it
- is the part of a computer that houses the primary devices that perform operations and produce results for complex
- Carries the data between the processor and other components.
15 Clues: brain of the computer • Is your system's short-term memory. • Its an object that absorbs heat from the CPU. • Allows you to add various types of expansion cards. • Carries the data between the processor and other components. • The memory from which we can only read but cannot write on it. • It is where your software, documents, and other files are stored. • ...
Talia Common Terms 2025-09-23
Across
- To bring in data.
- Where you can store stuff safely and access anytime or location if you have an internet connection.
- The Internet, where things can be stored instead on a hard drive.
- Cloud storage made by Google includes google apps.
- Information and instructions that tells the computer how to work and what to do.
- A file format that looks like a printed document that can be viewed, printed, and transmitted. It can not be edited by other people.
Down
- A wireless networking technology that uses radio waves that allow devices use internet or communicate within a certain area.
- Physical parts of a computer, like the keyboard, monitor, the mouse, and the processing unit. Most of it is inside the computer case.
- Sending a file from a computer to a remote device or internet.
- Type of image file that does not lose quality and supports transparency.
- The address of a web page
- An application for accessing websites and the Internet- Chrome, firefox
- To transfer, move, or copy a file or program from a website to a computer.
- The screen that appears when you first start your computer that displays app icons on your computer.
- A network that connects many devices from all around the world.
15 Clues: To bring in data. • The address of a web page • Cloud storage made by Google includes google apps. • Sending a file from a computer to a remote device or internet. • A network that connects many devices from all around the world. • The Internet, where things can be stored instead on a hard drive. • ...
Computer equipment and phones 2021-10-22
Across
- It connects a piece of electrical equipment to the main supply of electricity.
- A part of a computer or a television on which pictures or words are shown.
- A small computer that is easy to carry, usually without a keyboard.
- It is used to carry electricity.
- You use it to charge your phone.
- You connect it to a computer to copy and store information.
Down
- You move it to select and move items on the computer screen.
- A machine for printing text on paper.
- A mobile phone that can be used as a small computer and connects to the internet.
- The set of letters that you touch to write on a smartphone, computer ...
- It produces sound.
- A small computer that can work with a battery and be easily carried.
12 Clues: It produces sound. • It is used to carry electricity. • You use it to charge your phone. • A machine for printing text on paper. • You connect it to a computer to copy and store information. • You move it to select and move items on the computer screen. • A small computer that is easy to carry, usually without a keyboard. • ...
Technology Crossword Puzzle 2016-08-04
Across
- a word, phrase, or image that you can click on (select) to jump to a new document or a new section within the current document
- A multitasking operating system developed in the early 1970s by scientists at Bell Laboratories.
- Is a special RAM chip powered and maintained by a small battery that holds basic configuration data your computer needs in order to start. This info can be edited as part of your BIOS. Edit info such as: boot order, enable or disable motherboard devices.
- Local Area Network or a computer network in a small area such as an office building
- A way of modeling a problem situation or event that would be too difficult or impractical to actually perform
- A computer (or computers) that provides client stations (your computer) with access to files and printers as shared resources to a computer network
Down
- printers, scanners and other devices used with a computerdot
- A small view (small file size/lower resolution) of an image that makes it easy to look at lots of images quickly and identify the ones you want to use
- moving pictures expert group; standard for compressing digital video; universal standard for digital video
- Adding motion to an object.
- Wide Area Network or a computer network over a large area, such as a country or several countries.
- basic picture element on a display
- Universal Serial Bus which is probably the most common interface for peripheral device
- means of compressing a sound sequence into a very small file, to enable digital storage and transmission
- A device that routes packets of data between two or more computer networks
- a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
16 Clues: Adding motion to an object. • basic picture element on a display • printers, scanners and other devices used with a computerdot • A device that routes packets of data between two or more computer networks • Local Area Network or a computer network in a small area such as an office building • ...
Technology with Sergi and Walid 2023-12-15
Across
- browser a software application used to access information on the World Wide Web
- the row or set of keys on a piano, organ, typewriter, computer, etc.
- an instrument that changes sound waves into electric currents, used in recording or transmitting sound.
- a wireless technology that uses a radio frequency to share data over a short distance, eliminating the need for wires
- a camera that transmits still or moving images over the internet
- an application program
- random access memory semiconductor memory in which all storage locations can be rapidly accessed in the same amount of time. It forms the main memory of a computer, used by applications to perform tasks while the device is operating
- an electronic device designed for performing operations on data at high speed
Down
- the part of a television or computer on which a picture is formed or information is displayed
- a communication method that uses electronic devices to deliver messages across computer networks
- a computer program that can copy itself and infect a computer without permission or knowledge of the user.
- the science of making machines that can think like humans
- a software application used to access information on the World Wide Web
- system the collection of software that directs a computer's operations, controlling and scheduling the execution of other programs, and managing storage, input/output, and communication resources.
- an electrical device consisting of two earphones held in position by a flexible metallic strap passing over the head
- a palm-sized device equipped with one or more buttons, used to point at and select items on a computer display screen and to control the movement of the cursor
16 Clues: an application program • the science of making machines that can think like humans • a camera that transmits still or moving images over the internet • the row or set of keys on a piano, organ, typewriter, computer, etc. • a software application used to access information on the World Wide Web • ...
Computer Terms 2024-08-22
Across
- The foundation of a computer that gives it the basic services and functions to run
- The items inside a computer that allow it to function
- A device that converts electrical current into power to charge/run the computer
- A peripheral that is generally already in laptops, or connected through a USB slot, transfers visual data that it intakes to the computer/other computers
- An input on the motherboard which allows for an expansion card to be inserted
- What allows a computer to run all of its systems and programs
Down
- A device that allows for more storage onto the computer, either plugged in or put inside a slot made for it
- A computer program or device that provides services to other computers and their users
- A system composed entirely out of 0's and 1's
- An external device connected to the computer, allowing it to run as an input or output for the computer
- Software that allows a computer's basic functions
- A data transfer device that is generally used to connect peripherals or to transfer data
12 Clues: A system composed entirely out of 0's and 1's • Software that allows a computer's basic functions • The items inside a computer that allow it to function • What allows a computer to run all of its systems and programs • An input on the motherboard which allows for an expansion card to be inserted • ...
Computer Terms 2024-08-22
Across
- The foundation of a computer that gives it the basic services and functions to run
- The items inside a computer that allow it to function
- A device that converts electrical current into power to charge/run the computer
- A peripheral that is generally already in laptops, or connected through a USB slot, transfers visual data that it intakes to the computer/other computers
- An input on the motherboard which allows for an expansion card to be inserted
- What allows a computer to run all of its systems and programs
Down
- A device that allows for more storage onto the computer, either plugged in or put inside a slot made for it
- A computer program or device that provides services to other computers and their users
- A system composed entirely out of 0's and 1's
- An external device connected to the computer, allowing it to run as an input or output for the computer
- Software that allows a computer's basic functions
- A data transfer device that is generally used to connect peripherals or to transfer data
12 Clues: A system composed entirely out of 0's and 1's • Software that allows a computer's basic functions • The items inside a computer that allow it to function • What allows a computer to run all of its systems and programs • An input on the motherboard which allows for an expansion card to be inserted • ...
CYBERCRIME 2021-07-13
Across
- any illegal action that occurs within or via the use of electronic communication networks such as the Internet.
- an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- an offering that uses false or fraudulent claims to solicit investments or loans or that provides for the purchase, use, or trade of forged or counterfeit securities.
- it is one computer is used to reprogram another for illicit purposes.
- it is the surveillance that focuses not upon the visual or other tracking of the physical individual but of collecting, collating and analyzing data about the individual’s activity often in the form of electronic records.
- terrorist activity that targets computer networks and information systems for attack.
- it is a negative information is spread online about a stock driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
- the act of copying digital material posted online into the storage medium on one’s computer.
- sexually explicit visual or written representations whose primary goal or usage is to generate sexual excitement.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- an investment scheme in which investors are promised abnormally high profits on their investments.
- a program is secretly attached to the company’s computer system.
- an act emending certain provisions of republic act no. 8293
- an act prescribing the intellectual property code and establishing the intellectual property office providing for its powers and fuctions and other purposes.
- stalking that takes place via online communication mechanism such as email chat rooms instant messaging and discussion lists.
- the right to be left alone freedom from observation and interference from others.
- an illegally obtains data from a computer system by leaking it out in small amounts.
- criminal acts that tend to go largely unobserved unremarked and unrecorded in official assessments and measures of criminal activity.
- an act providing for the recognition and electronic commercial and non-commercial transactions and documents, penalties for the unlawful use thereof, and for other purposes.
- the crime that occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
Down
- the interactional space or environment created by linking computers together into a communication network.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- unauthorized access to the entire or any part of a computer system.
- it should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge.
- It occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
- A techniques and tools for encoding or scrambling data in such a way that it is incomprehensible to those who do not have access to the key required to decode the data back into its original legible form.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.Cyber-trespass- it is the crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- political activism and social protest that uses hacking tools and techniques.
- property that takes the form of ideas expressions sign symbols designs logos and similar intangible forms.
- a generally derogatory term used to describe activities associated with hacking in its second sense that of unauthorized access to computer systems.
- unauthorized copying distribution or sale of informational commodities over which some party claims property rights is referred to as copyright violations.
- these can be used to store copies of files from the computer for use in his investigation.
- any non-public transmission of computer data to from or within a computer system intercepted by technical means without permission including electromagnetic emissions from a computer system containing such computer data.
- the most sensitive component as prevention from cybercrime.
- the fraudulent practice of establishing facsimiles or legitimate websites to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details credit card numbers and account passwords.
- most computer programs used in business have built-in anti-theft safeguards.
- an interactive technologies that allow the creation or sharing/exchange of information ideas career interests and other forms of expression via virtual communities and networks.
- a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- an act regulating the issuance and use of access device prohibiting fraudulent acts committed relative thereto providing penalties and other purposes.
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network modes.
- it is doing psychological harm to, or inciting physical harm against others thereby breaching laws relating to the protection of the person eg hate speech stalking.
- it is a crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- it is generally implemented using firewalls which provide a centralized point from which to permit or allow to access.
- unauthorized access to, and interference with a computer system the illicit and typically illegal acts associated with unauthorized access to and interference with a computer system.
- market economic activity undertaken via the internet or similar electronic communication networks.
- an act defining cybercrime providing for the prevention investigation supression and the imposition of penalties therefor and for other purposes.
- repeated harassing or threatening behavior in which an offender persistently contracts follows approaches threatens or otherwise subjects a victim to unwelcome attentions.
50 Clues: the most sensitive component as prevention from cybercrime. • an act emending certain provisions of republic act no. 8293 • a program is secretly attached to the company’s computer system. • unauthorized access to the entire or any part of a computer system. • it is one computer is used to reprogram another for illicit purposes. • ...
CYBERCRIME 2021-07-13
Across
- any non-public transmission of computer data to from or within a computer system intercepted by technical means without permission including electromagnetic emissions from a computer system containing such computer data.
- it is one computer is used to reprogram another for illicit purposes.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.Cyber-trespass- it is the crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- property that takes the form of ideas expressions sign symbols designs logos and similar intangible forms.
- the crime that occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
- group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network modes.
- the act of copying digital material posted online into the storage medium on one’s computer.
- the most sensitive component as prevention from cybercrime.
- these can be used to store copies of files from the computer for use in his investigation.
- an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- a generally derogatory term used to describe activities associated with hacking in its second sense that of unauthorized access to computer systems.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- repeated harassing or threatening behavior in which an offender persistently contracts follows approaches threatens or otherwise subjects a victim to unwelcome attentions.
- market economic activity undertaken via the internet or similar electronic communication networks.
- any illegal action that occurs within or via the use of electronic communication networks such as the Internet.
- it is generally implemented using firewalls which provide a centralized point from which to permit or allow to access.
- it is a negative information is spread online about a stock driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- the right to be left alone freedom from observation and interference from others.
- it is a crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- it should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge.
- criminal acts that tend to go largely unobserved unremarked and unrecorded in official assessments and measures of criminal activity.
- an illegally obtains data from a computer system by leaking it out in small amounts.
- the fraudulent practice of establishing facsimiles or legitimate websites to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details credit card numbers and account passwords.
- unauthorized copying distribution or sale of informational commodities over which some party claims property rights is referred to as copyright violations.
- unauthorized access to, and interference with a computer system the illicit and typically illegal acts associated with unauthorized access to and interference with a computer system.
- an act emending certain provisions of republic act no. 8293
Down
- unauthorized access to the entire or any part of a computer system.
- a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- sexually explicit visual or written representations whose primary goal or usage is to generate sexual excitement.
- most computer programs used in business have built-in anti-theft safeguards.
- It occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
- an investment scheme in which investors are promised abnormally high profits on their investments.
- an interactive technologies that allow the creation or sharing/exchange of information ideas career interests and other forms of expression via virtual communities and networks.
- a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- it is the surveillance that focuses not upon the visual or other tracking of the physical individual but of collecting, collating and analyzing data about the individual’s activity often in the form of electronic records.
- an offering that uses false or fraudulent claims to solicit investments or loans or that provides for the purchase, use, or trade of forged or counterfeit securities.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- a program is secretly attached to the company’s computer system.
- the interactional space or environment created by linking computers together into a communication network.
- terrorist activity that targets computer networks and information systems for attack.
- an act providing for the recognition and electronic commercial and non-commercial transactions and documents, penalties for the unlawful use thereof, and for other purposes.
- it is doing psychological harm to, or inciting physical harm against others thereby breaching laws relating to the protection of the person eg hate speech stalking.
- A techniques and tools for encoding or scrambling data in such a way that it is incomprehensible to those who do not have access to the key required to decode the data back into its original legible form.
- an act regulating the issuance and use of access device prohibiting fraudulent acts committed relative thereto providing penalties and other purposes.
- an act defining cybercrime providing for the prevention investigation supression and the imposition of penalties therefor and for other purposes.
- stalking that takes place via online communication mechanism such as email chat rooms instant messaging and discussion lists.
- an act prescribing the intellectual property code and establishing the intellectual property office providing for its powers and fuctions and other purposes.
- political activism and social protest that uses hacking tools and techniques.
50 Clues: the most sensitive component as prevention from cybercrime. • an act emending certain provisions of republic act no. 8293 • a program is secretly attached to the company’s computer system. • unauthorized access to the entire or any part of a computer system. • it is one computer is used to reprogram another for illicit purposes. • ...
CROSSWORD 2019-08-03
Across
- a computer that is portable and suitable for use while traveling.
- is a piece of hardware that carries out the instructions of a computer program.
- a panel of keys that operate a computer
- is a file created by a software application.
- a location connected to the Internet that maintains one or more pages on the World Wide Web.
- is a small handheld input device that controls a computer screen's cursor.
Down
- a machine for printing text or pictures onto paper, especially one linked to a computer.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- a small electronic device containing flash memory that is used for storing data or transferring it to or from a computer, digital camera, etc.
- a device that scans documents and converts them into digital data.
- messages distributed by electronic means from one computer user to one or more recipients via a network.
- are terms used to refer to internal storage space on a computer.
12 Clues: a panel of keys that operate a computer • is a file created by a software application. • are terms used to refer to internal storage space on a computer. • a computer that is portable and suitable for use while traveling. • a device that scans documents and converts them into digital data. • ...
Assembly language 2022-01-14
Across
- Which computer hardware device performs the functions like click, point, drag, or select?
- Who is called the inventor of the first modern electronic computer?
- What was the name of the first computer invented?
- whatis the computer's main circuit board called?
- What was the first computer system that used color display?
- Who is known as the father of computers?
Down
- how many generations of computers have been invented?
- was the first computer invented?
- Which popular company designed the first CPU?
- what was the name of the first computer programmer?
- what was the first mass-produced computer?
11 Clues: was the first computer invented? • Who is known as the father of computers? • what was the first mass-produced computer? • Which popular company designed the first CPU? • whatis the computer's main circuit board called? • What was the name of the first computer invented? • what was the name of the first computer programmer? • ...
IBCA Vocabulary Crossword (Set 4) 2016-09-22
Across
- Software feature that allows a document to be stored or updated under an assigned name.
- Makes capital letters and certain symbols when held down at the same time as those keys.
- Device that can read and copy a document or picture and automatically transfer this information to the computer.
- A button that turn a feature on and off.
- A strip at the bottom of the screen that contains the Start button, Quick launch toolbar, and clock that shows buttons for the programs that are running.
- A piece of computer code designed as a prank or malicious act.
- The largest, fastest, and most powerful of all types of computers.
- Icons or buttons that represent commands; some of the same commands found on menus.
- Used for saving and storing data
- To press the right button on the mouse and release it, displaying the shortcut menu.
- Marks used to indicate where tabs, spaces, and blank lines are located.
- A command that allows the user to name, rename, or change the location of a document when saving.
Down
- The horizontal strip across the top of a window that contains the name of the file you are working on and, for some programs, the name of the software.
- A combination of letters and numbers that serve as your "identification" when logging into a computer system or online service.
- A key combination that chooses a menu option without the need to display a menu.
- Transferring information from your personal computer or another electronic device to a server.
- Memory that is lost when the computer is turned off.
- The science and practice of transmitting information by electromagnetic means.
- The instructions or programs that a computer needs to perform various functions.
- To take away the last action that you made.
- The memory area in which all programs and data on your computer are stored till needed.
- A defect in the code or routine of a program.
- The electronic equivalent of junk mail.
- The complete set of all documents residing on all Internet servers that use the Hyper-Text Transfer Protocol, which users can access with a simple point and click system.
- To quit all applications and turn off the computer.
25 Clues: Used for saving and storing data • The electronic equivalent of junk mail. • A button that turn a feature on and off. • To take away the last action that you made. • A defect in the code or routine of a program. • To quit all applications and turn off the computer. • Memory that is lost when the computer is turned off. • ...
Cyber-Security Amanda Peart 2020-10-21
Across
- C of the CIA triad
- computer operating system for Apple Computer's MacIntosh line of personal computers and workstations
- the physical components that a computer system requires to function
- a bit of data, which is sent by a sender, to a recipient
- the software that supports a computer's basic functions
- a person who uses computers to gain unauthorized access to data
- I if the CIA Triad
- to decode (a message) with or without previous knowledge of its key
- encompasses measures taken to improve the security of an application
- a file that exists of cells in rows and columns and can help arrange, calculate and sort data
- a legal instrument governing the use or redistribution of software
- heads the national effort to investigate and prosecute internet crimes, including "cyber-based terrorism, espionage, computer intrusions, and major cyber fraud"
- the programs and other operating information used by a computer
- A fo the CIA Triad
Down
- allows the user to interact with the computer by typing in commands
- caused 1 billion user accounts may have been comprised
- nothing to do with a certain well-recognized US intelligence agency
- the field of work in which someone manages one or more systems
- convert (information or data) into a cipher or code, especially to prevent unauthorized access
- each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet
- the art of writing or solving codes
- the study of codes, or the art of writing and solving them
- a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword
- A piece of software that prevents pop-up advertisements from being displayed
- a hardware or software component that stores data
- activity that either targets or uses a computer, a computer network or a networked device
- a software program that runs on your computer
- job is to protect online data from being compromised
- developed by Microsoft Corporation to run personal computers
- a way for software developers to fine-tune a product to make it the best it can be
30 Clues: C of the CIA triad • I if the CIA Triad • A fo the CIA Triad • the art of writing or solving codes • a software program that runs on your computer • a hardware or software component that stores data • job is to protect online data from being compromised • caused 1 billion user accounts may have been comprised • the software that supports a computer's basic functions • ...
Chapter 1 Let's Communicate! 2017-02-01
Across
- A system that gives current location, directions from a location to a destination or distance from a location to a destination.
- Can use software designed for another type of device.
- A set of rules used by computers to govern the exchange or transmission of data between files.
- The technical details of a device or system.
- Working together with other people.
- The ability to do many different things on one device.
- Materials that are available for everyone to use.
- A group of two or more computers connected together where data can be shared.
- Devices that can be attatched and used with a computer e.g. a webcam.
- The amount of data that can be transferred in a fixed amount of time or range within a and of frequencies or wavelength.
- Software downloaded onto a computer without the owner's permission that causes other programs to malfunction.
- A computer program with a graphical user interface for displaying HTML files, used to navigate the internet.
- The part of a computer in which operations are controlled and executed.
Down
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Irrelivant messages sent to multiple recipients at the same time normally by small-scale companies.
- Copying someone else's work and claiming it as your own.
- The system software that manages computer hardwarre and software resources - all computers require this to function. (Windows/Linux/macOS)
- The customary code of polite behaviour in society or among members of a particular profession or group.
- Performs many of the functions of a computer, with a touchscreen interface, downloadable apps and SMS.
- The term used to indicate any kind of delay between data communication over a network.
- Short range wireless uinterconnection for mobile phones or other devices, data can be transferred or sent.
- Larger than a notebook but smaller than a laptop, usually cheap and allows access to the web, portable, and lower specs.
- A disk drive used to read from and write to a hard disk.
- The physical components of a computer e.g. the CPU and the devices connected to it.
- Someone who uses computers to gain unauthorized access to data.
- Software that allows you to make calls over the internet, usually free.
26 Clues: Working together with other people. • The technical details of a device or system. • Materials that are available for everyone to use. • Can use software designed for another type of device. • The ability to do many different things on one device. • Copying someone else's work and claiming it as your own. • A disk drive used to read from and write to a hard disk. • ...
Electricity 2024-01-23
Across
- - text files containing data to identify you're computer
- files - in folders on a computer in order to organize you're software (2 words)
- - technology provides more opportunity for social and political ______
- - of or pertaining to a phone
- - electricity used in a negative way in order to hurt someone or something
- - through the internet
- address - the numbers assigned to a device (2 words) (abbreviated)
- - electricity invades our ____
- - the copying of information from one system to another in order to preserve it in you're device
- - most popular search engine
- press - The first type of technology in the lineage of news websites (2 words)
- - a word or phrase given to provide access to something
- - in order to not let electronics control us we must place _______ on it
- - not real yet through software
- - a cord often use for a computer
- transit - allowing network to go between computers (2 words)
- engine - looking things up based on key words in the ______ (2 words)
- - we cannot handle full electronic ____ in society
- - link
- - breaks into your internet
- - a hard drive to hold onto you're information
- - the computers code often found in the search bar
Down
- sharing - transmitting files between computers (2 words)
- - What we can find anywhere we look on the internet
- - able to put out what ever information with government intervention
- - computer culture
- - cellular device almost everyone has
- - being able to _____ to the internet
- - Personal computer
- - where you can watch shows, movies, or sports at home
- - world wide web (abbreviated)
- - a platform that can run on any operating system
- - not having wires
- - conversation style website
- - desktops, PCs, or laptops are types of this
- - malware that spreads between devices that damages software
- - limiting to how much electricity or devices can be used
- - to look something up
- - mechanism to perform a task with several parts
- - a centralized resource or network for a computer
- - piece of electronic equipment
- - uniform resource locator (abbreviated)
- - a web____
- - devices linked together via _____ to share resources
- - a program to display information and access wed pages
- - internet surfing
- - Hypertext Markup Language (abbreviated)
- drive - the component in a computer that stores data (2 words)
- - _____ runs on electricity
- - slow moving internet
50 Clues: - link • - a web____ • - computer culture • - not having wires • - internet surfing • - Personal computer • - through the internet • - to look something up • - slow moving internet • - _____ runs on electricity • - breaks into your internet • - conversation style website • - most popular search engine • - of or pertaining to a phone • - world wide web (abbreviated) • ...
Vocabulary Review - Weeks 1-7 2024-02-23
Across
- A person who operated a mainframe. She was called this!
- The part of the Web often not accessible to us because they are password protected.
- Last name of the cofounder of Apple computers.
- What the earliest computer was called before we called it a computer. It filled a room!
- What kind of software would be Linux or Windows? Not Application software, it’s_________ software.
- The college dropout took a class which gave him the idea of a computer company. What unusual class was this?
- A first working model of an invention meant to demonstrate. It’s not perfect.
- When there is a two-way flow of information between devices, you call this experience this. (See Engelbart handout.)
- Another word for tiny bits of data that flow through the Internet till they get to their destination.
- First name of the inventor of the World Wide Web
- A competitor to AMD that manufactures microprocessors.
- In addition to the mouse, Doug Engelbart demonstrated this new way to link documents.
- Data about a person that might include a retina scan or facial geometry. Definitely PII!
- The internal storage device in a computer.
- You save a document on Google Drive, you save it to here. (It’s not really ‘fluffy.’)
Down
- If a project’s goal is huge, risky, and ambitious companies call this a ____________ project.
- Any external device that provides input and output for the computer.
- The second word of RAM
- What the Internet was called when it was part of the Defense Department Advanced Research project.
- Thomas Edison’s ‘Voice Tube’ was called this.
- The tiny rectangle of hardware that ‘knows’ which circuits to use, and does math calculations.
- The keyboard command for searching a word on a website, or any document.
- What the station master taught Thomas Edison after he saved his son’s life.
- The central ‘processing’ unit of a computer.
- It means ‘to be concealed’ and is a feature on a web browser to avoid being tracked.
- The main circuit board inside a computer on which is the CPU, Hard Drive, and RAM.
- Information that could specifically identify you: Three letters.
- To create a ‘grid’ in a Google document, you click on ‘INSERT’ and select this option.
28 Clues: The second word of RAM • The internal storage device in a computer. • The central ‘processing’ unit of a computer. • Thomas Edison’s ‘Voice Tube’ was called this. • Last name of the cofounder of Apple computers. • First name of the inventor of the World Wide Web • A competitor to AMD that manufactures microprocessors. • ...
Liam's Crossword Puzzle 2024-09-13
Across
- is a hardware component that holds all your digital information you implant in the drive
- They are used mostly to remember information about you and keep track of browsing active, piracy, and more.
- is a low-cost alternative to traditional laptops from Google
- is a collection of information stored in a computers system or any other form of storage.
- is all of the things you can access remotely over the Internet.
- is a video camera that captures recordings or take images as well as to connect to other computers
- A quotation from or reference from a book, paper, or an author.
- system that links multiple computing devices receive and share information
- An electronic device for storing or processing data
- is a app or device that is intended to attracted people to use it more frequently than they should.
- is a device that filters through things going in and out of the computer.
- is a wireless network technology that allows all mobile devices to connect to the internet.
- is a software (internal) that provides a “brain” for your computer.
- Technology you can connect to a network near you
Down
- a global computer network providing a variety of information and communication facilities
- a device that connects an electronic to the internet
- is simply having the ability to use mobile/computers and internet in our day to day lives
- is a reference to a resource that specifies its location on a computer network
- is a personal computing device that is is made to be put on a office desk
- acts as a buffer/holding space for information the computer
- is the component holds the microprocessor
- is a software program that helps people find the information they are looking for online
- is an industry standard for short-distance digital data communication.
- includes the physical parts of a computer.
- is a set of instructions, data or programs used to operate computers and execute specific tasks
- is a cyberattack it uses emails,text,calls or website to get personal info
- a piece of hardware that connects to your computer or device so that you may view what is on the device.
27 Clues: is the component holds the microprocessor • includes the physical parts of a computer. • Technology you can connect to a network near you • An electronic device for storing or processing data • a device that connects an electronic to the internet • acts as a buffer/holding space for information the computer • ...
Ch. 12 Computers and Technology in Health Care - KEY TERMS 2025-02-18
Across
- high-energy particles decreasing size of tumors and treats cancer
- surgeon uses preoperative and intraoperative images to guide or direct surgery
- resonance imaging (MRI): computerized, body-scanning method using nuclear magnetic resonance
- three or four computers linking together
- information entered into areas
- protective programs limiting ability of other computers to access a computer
- small amount of radioactive substance
- technology to direct ultrahigh-frequency sound waves through chest well and into heart
- collection of related information
- group of related records is combined
- programs containing instructions to alter operation of computer programs
- basic understanding of how a computer works and the applications used in your field or profession
- medication stimulating effect of exercise to increase blood flow and heart rate
- surge protector and battery backup
- use of video, audio, and computer systems to provide medical or health care services
- also called computer-assisted surgery, major technological advance
- noninvasive, computerized X-ray
Down
- links millions of computers throughout the world
- tomography: slightly radioactive substance injected into patient
- medication stimulating effect of exercise increasing blood and heart rate
- rapid dispensing of medications
- handheld tablet, smartphone, personal digital assistant
- computerized version of a patient’s medical information
- medication stimulating effect of exercise to increase blood flow and heart rate (used for patients who cannot exercise)
- three-dimensional imaging models used to make prosthetics
- allows all health care agencies to transfer patient electronic health records
- light beams that can be focused precisely
- computerized interpretation system that produces visual pictures on a computer monitor printing out patient’s heart
- online teaching and learning environment using computers and internet
- noninvasive scanning method using high-frequency sound waves bouncing back as an echo when hitting different tissues and organs in the body
- applied science to promote individual’s safety and well-being
- secure online websites
- educational computer programming designed for individual use (robotic surgery)
- controls launch of a rocket to outer space
- test run while patient is exercising
- can sit on a desktop
- special software to perform high-speed math calculations
- process of sending messages from one computer to another (e-mail)
38 Clues: can sit on a desktop • secure online websites • information entered into areas • rapid dispensing of medications • noninvasive, computerized X-ray • collection of related information • surge protector and battery backup • test run while patient is exercising • group of related records is combined • small amount of radioactive substance • three or four computers linking together • ...
Computer science PS 2025-09-11
Across
- a type of malware that attaches to a legitimate program or file, replicates itself, and spreads to other computers.
- All-Flash Array, which is a high-performance external storage system that uses only flash memory
- New Technology File System
- a type of physical connection used to transmit high-definition video and audio signals from the computer to another device.
- Graphics Processing Unit is a specialized processor in a computer that handles graphics and visual tasks.
- Central Processing Unit is the "brain" of a computer, responsible for executing instructions, performing calculations, and controlling other components to carry out tasks.
- the standard interface used to connect storage devices like hard drives
- Liquid Crystal Display, is a flat-panel computer display technology that uses a backlight and liquid crystals to produce images.
- primarily refers to the microprocessor, the central processing unit of a microcomputer.
- Read-Only Memory is a type of non-volatile memory that stores permanent, fixed instructions for hardware and the operating system's startup process.
- an analog video interface standard used to connect a computer to a display like a monitor or projector.
- Digital Visual Interface
Down
- (Abbreviations) a widely adopted wired networking technology that provides high-speed.
- Basic Input/Output System is a firmware that initializes and tests hardware components during startup, allowing the operating system to boot and manage hardware effectively.
- Control Unit, a fundamental component of the Central Processing Unit.
- a type of data storage device for computers that uses flash memory, making it significantly faster, more durable, and more energy-efficient than traditional hard disk drives
- network interface controller, is a hardware component that allows a computer to connect to a network.
- Arithmetic Logic Unit, is a crucial digital circuit in a computer's Central Processing Unit
- Advanced Technology Attachment refers to a standard interface and protocol used for connecting storage devices like hard drives
- Hard Disk Drive is the main storage device in a computer.
- a standard interface for connecting and powering peripheral devices
- Character User Interface, a text-based system where users interact with the computer by typing commands and receiving text-based responses.
- Microsoft Management Console, a powerful Windows tool that provides a unified graphical interface for system administrators.
- Redundant Array of Independent Disks
- Random Access Memory, is a computer's short-term.
- minicomputer.
26 Clues: minicomputer. • Digital Visual Interface • New Technology File System • Redundant Array of Independent Disks • Random Access Memory, is a computer's short-term. • Hard Disk Drive is the main storage device in a computer. • a standard interface for connecting and powering peripheral devices • Control Unit, a fundamental component of the Central Processing Unit. • ...
Bancolini 2020-11-30
Across
- unità di misura della memoria di un computer
- unità di elaborazione che compie le operazioni di calcolo
- memorizzano dati in esecuzione
- parte logica del computer
- orologio interno che scandisce l'esecuzione delle operazioni
- memoria temporanea che si svuota allo spegnimento dell'elaboratore
- opposto dell'input
- usato per la memorizzazione di programmi, musica o filmati
Down
- ne esistono di due tipi
- insieme dei dispositivi fisici per ricevere dati dall'esterno, elaborarli e alla fine produrre risultati
- disco rigido usato come memoria di massa del computer
- dispositivo di input
- insieme dei componenti fisici che costituiscono l'elaboratore
- nome che prendono i simboli 0 e 1 nel sistema di numerazione binario
- memoria permanente
- scienza che si occupa della trasmissione delle informazioni per mezzo dell'elaborazione elettronica
- unità che coordina lo svolgimento dell'esecuzione delle operazioni
17 Clues: memoria permanente • opposto dell'input • dispositivo di input • ne esistono di due tipi • parte logica del computer • memorizzano dati in esecuzione • unità di misura della memoria di un computer • disco rigido usato come memoria di massa del computer • unità di elaborazione che compie le operazioni di calcolo • usato per la memorizzazione di programmi, musica o filmati • ...
Emily_23/11/2010_quiz 2023-03-23
Across
- you can search for information
- you always bring tasks because
- When i make you happy.
- I want to be yopur friend.
- you can work with your classmates
- you call your friend or crush
- what i want to do in my free time?
Down
- is in the technology room and you use it a lot.
- youy take pictures whit them
- is the app where you can send a message on your cell phone.
- is the app that you can listen music
- is what teacher imelda uses to talk to after recess.
- you play in the computer
- you used to write in the computer
- 23 When birthday.
- brown The color of my eyes.
- you use it to click on your computer screen
17 Clues: 23 When birthday. • When i make you happy. • you play in the computer • I want to be yopur friend. • youy take pictures whit them • you call your friend or crush • you can search for information • you always bring tasks because • brown The color of my eyes. • you used to write in the computer • you can work with your classmates • what i want to do in my free time? • ...
KB4 Technology 2021-04-19
Across
- something you use to go on the internet or send an email
- something you use to call or message someone
- a short film or recording that you can watch, for example, on YouTube
- something you use to take photos
- it is rectangular and similar to a large mobile phone or a small computer
Down
- the part of the computer that you look at
- something you use to click on the computer - you touch it with your hand
- something you press to turn the computer on
- something you use to listen to music
- a disc you use to watch films or record information
- a letter or message you send to someone on the internet
- a small computer that you can carry with you
- an electronic book
13 Clues: an electronic book • something you use to take photos • something you use to listen to music • the part of the computer that you look at • something you press to turn the computer on • something you use to call or message someone • a small computer that you can carry with you • a disc you use to watch films or record information • ...
adad 2022-03-16
Across
- the name given to a user on a computer or computer network
- central processing unit of the computer
- software utility designed to protect your computer or network against computer viruses
- a software program to present and explore content on the World Wide Web.
- Hypertext Markup Language
- electronic mail; system of sending messages through the internet
- random access memory [it goes away when one switches off]
Down
- free Internet browser officially released by Google on 2008
- fixed, magnetic disc inside a PC for (permanent) storing of data
- the alphanumeric keys or buttons used to input data [QWERTY = 1st 6 keys]
- Uniform Resource Locator
- a program dedicated to a specific task [eg: word processing, graphics etc]
- the programs, routines etc for a computer, not the hardware
13 Clues: Uniform Resource Locator • Hypertext Markup Language • central processing unit of the computer • random access memory [it goes away when one switches off] • the name given to a user on a computer or computer network • free Internet browser officially released by Google on 2008 • the programs, routines etc for a computer, not the hardware • ...
Cybersecurity - malware 2022-01-31
Across
- The Computer ____ Act makes it an offence to impair the operation of a computer
- Do this to movies or games from illegal websites to catch a become infected from a computer virus
- Gaining unauthorised access to a computer system
- Attacker demands that a ransom be paid before they decrypt files and unlock the computer
- A large collection of malware-infected devices
- Self-replicating software
Down
- May be disguised as a game which then gives an attacker access via a backdoor
- Malicious software
- Distributed Denial of Service attack
- Monitors and gathers information on a person and how they use their computer
- Replicates themselves and spread through the network and use the system's resources
- Displays malicious adverts or pop-ups
- Records every keystroke made by a user
13 Clues: Malicious software • Self-replicating software • Distributed Denial of Service attack • Displays malicious adverts or pop-ups • Records every keystroke made by a user • A large collection of malware-infected devices • Gaining unauthorised access to a computer system • Monitors and gathers information on a person and how they use their computer • ...
Autonomy Of Computer 2017-09-25
Across
- Old plug for printer or scanner
- Transfers life into the computer
- Old version for connecting the computer to the screen slower than USB
- A chip that performs system check when the computer is booting up
Down
- The main circuit of the computer that makes it run
- The place where the graphic card is stored
- Otherwise known as the central processor, the brains of the computer
- A fast storage unit that stores temporary data
- Alternative to computer speakers or for better sound quality
- It’s a connecter that let’s a larger amount of data be transferred not for charging
- Old plug for mice and keyboard
- Slots that let surrounding devices communicate with the processor faster
- A connector that lets data be transferred through can also be used for charging
13 Clues: Old plug for mice and keyboard • Old plug for printer or scanner • Transfers life into the computer • The place where the graphic card is stored • A fast storage unit that stores temporary data • The main circuit of the computer that makes it run • Alternative to computer speakers or for better sound quality • ...
My computer anatomy - Theshani 2017-09-22
Across
- performs basic input and output operations of a computer system.
- activates when you turn on the computer
- supplies power to a computer through multicolored wires.
- transfers images to the computer
- slots that communicate with the processor and add devices such as modem
- used to connect, mice, keyboards, modems and printers.
- holds many crucial components, including the central processing unit (CPU), memory and connectors for input and output devices.
Down
- used to transfer data into and out of the computer.
- provides better sound quality
- used to connect and transfer data to older printers and scanners.
- port that transfers data extremely fast (400mbps)
- port that is used to connect to keyboards and mice
- memory or information storage inside a computer that is used to store programs and data.
13 Clues: provides better sound quality • transfers images to the computer • activates when you turn on the computer • port that transfers data extremely fast (400mbps) • port that is used to connect to keyboards and mice • used to transfer data into and out of the computer. • used to connect, mice, keyboards, modems and printers. • ...
Security risks and precautions 2023-08-28
Across
- A person seeking to gain unauthorised access to a computer system or network.
- A security system which monitors outgoing and incoming network traffic.
- Text which has been encrypted.
- cipher An old method of encryption.
- Changing cipher text back to plain text.
- A number or code which is used to encrypt or decrypt data.
- A type of computer program which self-replicates and causes damage to a computer system.
Down
- A type of computer program which disguises itself as a harmless file.
- A term used to describe harmful software.
- Text which has not yet been encrypted.
- A computer program which self-replicates and spreads across a computer network.
- A method of protecting data by changing it into a code so unauthorised users cannot read it.
- Changing plain text to cipher text.
13 Clues: Text which has been encrypted. • cipher An old method of encryption. • Changing plain text to cipher text. • Text which has not yet been encrypted. • Changing cipher text back to plain text. • A term used to describe harmful software. • A number or code which is used to encrypt or decrypt data. • A type of computer program which disguises itself as a harmless file. • ...
Jennifer Madewell- Crossword- 3rd Period 2016-10-25
Across
- Is a tool used search or browse the internet.
- Does not have these details or flourishes. And an example will be Arial font.
- Is a tool to search for information on the internet.
- Is a lightweight computer that is purposebuilt for remote access to serve. It depends heavily on another computer to fulfill its computation roles.
- Is small and low-powered but is still suitable for word processing, running a Web browser and connecting wirelessly to the internet
- Is a personal computer that fits on desk and is not portable.
- Are small decorative flourishes on the ends of some small strokes. And an example will be Times New Roman font.
- Is a program which provides some service to other programs.
Down
- is a computer software with its source code made available with a license in which the copyright holder provides the right to study, change, and distribute the software to anyone and for any purpose.
- Allows People to interact with each other online.
- Is a high-performance computer with high-volume.
- Is a flat computer with a touchable screen, thin.
- Is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- Is a person or thing regarded as a representative symbol of something.
- Is a high-performance computing machine with extremely fast processing speeds.
- Is a place to store something temporarily.
- Is a minute area of illumination on a display screen, one of many from which an image is composed.
17 Clues: Is a place to store something temporarily. • Is a tool used search or browse the internet. • Is a high-performance computer with high-volume. • Allows People to interact with each other online. • Is a flat computer with a touchable screen, thin. • Is a tool to search for information on the internet. • Is a program which provides some service to other programs. • ...
lesson 24 2016-04-19
Across
- a device that uses a coaxial cable to send and recieve data
- an expert computer user whoinvades someone elses computer for personal gain or for the satisfaction of doing it
- a type of fiber optic telephone line that can transmitup to 1.544 megabits persecond or can be used to transmitt 24 digitalized voice chanels
- communications hardware device that facilitates the treansmission of data
- the largest network used as a communication tool
- A combination of hardware and software that creates a buffer between a internal network and an external network
- an ISPthat provides connection speeds up to 30 times faster than dial-up connections
- a junction where information arives from connected computers or periferial devices and it is forwarded in one or more directions to other computers and devices
- computer network that covers a large geographical area. most wans are made up of several connected lans
- A computer that handles requests of data, email, file transfers, and other network services
- a network configuration that allows selected outside organizations to acess internal information systems
- a device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination
- a software program
Down
- the worlds collection of inner connected commercial and government owned voice-oreintated systems
- a recent wireless connection that can deliver minimum speeds of 7mbps to your phone
- A series of connected personal computers,workstations and other devices, such as printers or scanners within a confined space such as an office space
- computer archetecture in which to all of the computers on a network are equal and there is no computer designated as the server
- link from one computer to another through data that can be transmitted
- examine a finger print, a voice pattern or the retina of the eye
- the archatectual model relationship
- High-end programs designed to provide network control and include special functions for connectin gcomputers and other devices in a network
- a variation of lan that uses no physicall wires
- a network designed for the exclusive use of computer users within an organization that cannot be accessedby users outside the organization
- a server that acts as a intermeditery between the user and the internet
- a device on the network
25 Clues: a software program • a device on the network • the archatectual model relationship • a variation of lan that uses no physicall wires • the largest network used as a communication tool • a device that uses a coaxial cable to send and recieve data • examine a finger print, a voice pattern or the retina of the eye • ...
Chapter 13 Vocabulary 2023-11-08
Across
- change the frequency, amplitude, or other characteristic of an electronic communication signal; allows a signal to carry information over long distances
- the main circuit board in a computer
- an electronic device that retains information until it is needed
- the operating system and applications that allow us to perform meaningful tasks using a computer
- a device that allows people to touch and move objects in a virtual reality system
- the physical input, processing, and output components of a computer, such as a standard keyboard, mouse, CPU, and monitor
- an Internet protocol that converts voice signals into a digital format that can be sent over the Internet, allowing people to use their computers and the Internet to make calls
- an electronic signal that has only two values: on or off
- a receiver's response to a source's question or statement
- the protocol, or language that allows people to access the Internet
- an electronic signal that changes continuously in a smooth manner
- a computer system that consists of many individual computers working together
- the process of sending a signal to three different satellites; the time it takes the signal to bounce off each satellite and return to the sending device is then computed to identify the exact location of the sending device
Down
- a system that uses a microchip equipped with radio transmitter
- a form of distributed computing that uses the Internet to provide access to computer applications and other files
- the equipment and systems used for storing, processing, and extending the human ability to communicate information
- a central, powerful computer that "serves" or provides storage and services, to other computers on a network
- a group of eight binary bits that are read together as a single "word"
- a code used by digital electronics to convey information
- the part of a computer that accepts inputs, performs calculations, and other processing tasks, and send the results to output devices
- sources of communication and information, such as newspapers, radio and television broadcasts, and the Internet
- an electronic device that allows two or more different networks to communicate
- an on or off signal, known as a binary digit, in binary code used by computer
23 Clues: the main circuit board in a computer • a code used by digital electronics to convey information • an electronic signal that has only two values: on or off • a receiver's response to a source's question or statement • a system that uses a microchip equipped with radio transmitter • an electronic device that retains information until it is needed • ...
Per. 2 Cyber Security Words and Terms Puzzle Maker 2022-09-12
Across
- Software that can only be run for a limited amount of time before it expires.
- official United States cryptologic organization under the Department of Justice. Responsible for global monitoring, collection, and processing of information and data for both foreign and domestic intelligence.
- A simple form of code for software that can be written in word editors.
- A language used to create and control the content on a website.
- Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- An alternative way to access software or hardware.
- A test that distinguishes between robots and humans using a website.
- An error, flaw, failure, or fault in a computer program or system.
- Text that can be read by the human eye, like google results for how to make eggs.
- A cyber attacker who uses software and social engineering methods to steal data and information.
Down
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer.
- Program that automatically execute tasks as ordered by the creator of the program.
- A secret word or phrase that is used to access a computer system or service.
- typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, can corrupt data or expand throughout a network and damage systems across a company.
- The physical and tangible parts of a computer, such as the monitor, keyboard, speakers, etc.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server.
- The programs and other operating systems used by a computer.
- The method of obtaining user information through fraudulent communications targeted directly at people
- A form of malicious software that disguises itself as a harmless computer program.
22 Clues: An alternative way to access software or hardware. • The programs and other operating systems used by a computer. • A language used to create and control the content on a website. • An error, flaw, failure, or fault in a computer program or system. • A test that distinguishes between robots and humans using a website. • ...
Operating Systems & Networks 2023-09-13
Across
- Each connection on a hub.
- OS that originated in 1969 at Bell Labs. It was and still is regarded as the most powerful, versatile and flexible OS in the computer world.
- A computer network within a small geographical area such as a home, school or computer lab
- Simple and inexpensive network that typically connects fewer than 10 computers, each called a peer.(3 words)
- Network application that facilitates the transfer of files from one computer to another e.g. from a client to a server. (3 words)
- The operating system is a type of _________software which controls all of the computer’s resources (e.g. memory, hardware) and ensures that all parts of a computer system work together smoothly and efficiently.
- Software that programmers from around the world work to voluntarily develop. (2 words)
- Each Computer or Device on the network-has a unique network address.
- A Networking device that divides up the network into different segments to manage the amount of traffic.
- Network that provides highly efficient ways to connect 10 or more computers for exchange of large amounts of information: ______ server network.
- Operating system written by a graduate student at Helsinki University in Finland. An "open source" project.
Down
- A user interface to a computer’s operating system in which the user responds to a text prompt by typing in a command. (3 words)
- Software that helps people on a network to coordinate and manage business/educational projects. I.e. Google Docs, Slides etc.
- A graphical user ___________ typically consists of a desktop, icons, windows, pull-down menus, buttons, scroll bars etc.
- Single-user, single-tasking computer operating system that uses a command line interface.
- Networking devices that are used to connect multiple devices directly to the network using cables.
- Used for computers on a network to communicate on the network. It is capable of fast and constant connections.
- When uses need to physically carry information from one computer to another using external storage devices
- A group of two or more devices that can communicate.
- Apple iPhone system software
- Commercial software that can be bought, leased or licensed from its vendor/developer. Access to its source code is not provided
21 Clues: Each connection on a hub. • Apple iPhone system software • A group of two or more devices that can communicate. • Each Computer or Device on the network-has a unique network address. • Software that programmers from around the world work to voluntarily develop. (2 words) • Single-user, single-tasking computer operating system that uses a command line interface. • ...
technology 2023-10-11
Across
- Small mobile computing consumer device designed to be worn and that often communicate with a mobile device or printer. See also wearable
- Number system that has just two unique digits, 0 and 1, called bits.
- Square-shaped graphic that corresponds to a web address or other information. Short for quick response code.
- An application that helps businesses of all sizes record and report their financial transactions.
- An electronic image file format by Adobe Systems that mirrors the appearance of an original document. Short for Portable Document Format.
- A personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table. Also called a desktop computer.
- The electronic component of a computer that interprets and carries out the basic instructions that operate a computer. See also CPU
- Program designed to make users more productive and/or assist them with personal tasks.
- The amount of time it takes a storage device (1) to locate an item on a storage medium or (2) to deliver an item from memory to the processor.
- A mobile device on which you can store, organize, and play or view digital media.
- A private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
Down
- Programs designed to make users more productive and/or assist them with personal tasks.
- A mobile device that allows users to take pictures and store the photographed images digitally.
- A working model of the proposed system’s essential functionality.
- Continuous (wave form) signals.
- An electronic device, operating under the control of instructions stored in its own memory, that can accept data (input), process the data according to specified rules, produce information (output), and store the information for future use.
- A collection of related records stored on a storage medium such as a hard drive or on cloud storage; often simply called a file private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
- A series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them. See also program
- Unique address of a webpage. See also URL
- application of human intelligence to computers.
20 Clues: Continuous (wave form) signals. • Unique address of a webpage. See also URL • application of human intelligence to computers. • A working model of the proposed system’s essential functionality. • Number system that has just two unique digits, 0 and 1, called bits. • A mobile device on which you can store, organize, and play or view digital media. • ...
computer class 2022-09-06
Across
- the computer screen with out
- the printer ink went out
- the mouse on my computer broke
- i the car & a ram thing came to my mind
- The component of a computer system that controls the interpretation and execution of instructions
Down
- my hardriver broke inside of my computer
- the keyboard letter are mess up
- the scanner at food lion was down last night
- a system of interactive visual components for computer software.
- a printed circuit board containing the principal components of a computer or other device
- my phone speaker have water in it
- electrical device that supplies electric power to an electrical load
12 Clues: the printer ink went out • the computer screen with out • the mouse on my computer broke • the keyboard letter are mess up • my phone speaker have water in it • i the car & a ram thing came to my mind • my hardriver broke inside of my computer • the scanner at food lion was down last night • a system of interactive visual components for computer software. • ...
Technology 2025-11-13
Across
- a small computer you can carry with you
- the part of a computer or TV where you see things
- you watch shows, movies, and news on this
- you move this with your hand to control the cursor
- a flat computer you can touch the screen to use
- these play sounds or music loudly
- you use this to type on a computer
Down
- you put these on your ears to listen to music
- this makes paper copies of your computer files
- a machine that helps you work, play or study
- phone you use this to call or text people everywhere
- you use this to take photos
12 Clues: you use this to take photos • these play sounds or music loudly • you use this to type on a computer • a small computer you can carry with you • you watch shows, movies, and news on this • a machine that helps you work, play or study • you put these on your ears to listen to music • this makes paper copies of your computer files • ...
Computer History 2023-10-03
Across
- the first large-scale computer to allow use of vacuum tubes for computing
- Who created the vacuum tube to be used in computers?
- given credit for the first computer
- created the first computer program
- How did Herman Hollerith's machine work?
- Which computer programmer is given credit for the term computer "bug"?
Down
- What does ENIAC stand for?
- electronically controlled mechanical switches
- What was the first computer bug?
- a digital mechanical calculator
- What does IBM stand for?
11 Clues: What does IBM stand for? • What does ENIAC stand for? • a digital mechanical calculator • What was the first computer bug? • created the first computer program • given credit for the first computer • How did Herman Hollerith's machine work? • electronically controlled mechanical switches • Who created the vacuum tube to be used in computers? • ...
Input/Output Devices 2022-09-21
Across
- device that allows you to watch this super presentation
- we can see anythink bcs of this device
- Device where we plug in all devices
- you plug in to hear what your computer wanna tell you
Down
- this word can mean two devices that you plug in to computer
- type of device that send data to computer
- allows you to not use computer mouse
- we can hear your beautiful voice bcs of that device
- type of device that receives the data from computer
- allows you to connect the computer to the device without a cable
- allows you to know your location
11 Clues: allows you to know your location • Device where we plug in all devices • allows you to not use computer mouse • we can see anythink bcs of this device • type of device that send data to computer • we can hear your beautiful voice bcs of that device • type of device that receives the data from computer • you plug in to hear what your computer wanna tell you • ...
Office Essentials Concepts and Skills Vocab Crossword - Noah Gregory 2016-08-25
Across
- unique combination of letters or numbers that identifies a specific user to Windows.
- preforms specific action such as saving a file or obtaining help.
- enables you to view areas that cannot currently be seen on the screen.
- enable you to view areas that cannot currently be seen on the screen.
- the location of files that have been deleted
- control center in
- pressing on or more keys on the keyboard to perform a task.
- newest version of Microsoft Windows, which is a popular and widely used operating system.
- enables you to sign in to your user account and make the computer available for use.
- used to access apps, files, folders, and settings.
- allows you to access programs, folders, and files on the computer or mobile device and contains commands that allow you to start programs, store and search for documents, customize the computer or mobile device, and sign out of a user account or shut down the computer or mobile device.
- enlarge the window so that it fills the entire screen.
- named location on a storage medium that usually contains related documents.
Down
- a motion you make on a touch screen with the tip of one or more fingers or your hand.
- presents information about the document, the progress of the current tasks, and the status of certain commands and keys.
- list of related items, including folders, programs, and commands.
- private combination of letters, numbers, and special characters associated with the user name that allows access to a user’s account resources.
- screen when you first turn on the computer displaying time and date.
- portion of a document on the screen.
- identifies to Windows the resources, such as apps and storage locations, a user can access when working with a computer.
- named unit of storage
- horizontal or vertical bar that appears when the contents of a page may not be visible completely on the screen.
- set of programs that coordinate all the activities among computer or mobile device hardware.
- cloud storage service that provides storage and other services, such as Office Online, to computer users.
- consists of programs designed to make users more productive and/or assist them with personal tasks, such as word processing or browsing the web.
25 Clues: control center in • named unit of storage • portion of a document on the screen. • the location of files that have been deleted • used to access apps, files, folders, and settings. • enlarge the window so that it fills the entire screen. • pressing on or more keys on the keyboard to perform a task. • list of related items, including folders, programs, and commands. • ...
Internet & Security 2011-12-09
Across
- feature in internet explorer that lets you view websites without the browser storing data about your browsing session.
- to create a website that lloks exactly like another legitimate site on the web, but steals the information people enter.
- feature in the internet explorer that helps prevent websites or third-party developers from collecting information about the sites you visit.
- an illict activity used by hackers to trick computer users into revealing personal or financial through email massage or website.
- software that track a computer user's internet usage and sends this data back to the company or person that created it, usually without the computer user's permission or knowlegde.
- a feature in internet explorer 8 that hepls detect phishing websites.
- a descriptive word or phrase you enter to obtain a list of results that include that word or phrase.
- the steps a computer owner takes to prevent unauthorized use of or damage to the computer.
Down
- stores and organizes the link to the webpage that you want to revisit often.
- software that searches executable files for the sequences of characters that may cause harm and disinfects the files by erasing or disabling those commands.
- a software that lets you open and display website.
- window that opens on your screen as you visit websites, generally to advertise products you may or may not want.
- a string of at least eight characters of upper and lowercase letters and numbers.
- verifies the indentity of a person or indicates the security of a website.
- allows you to open more than one webpage at a time in a browser window.
- to break into a DNS server and redirect any attempts to access a particular website to a spoofed site.
- hardware or software that prevents other computers on the internet from accessing a computer or prevents a program on a computer from accessing the internet.
- a special website that searches the internet for websites based on words or phrases that you enter.
- a harmful program thyat intructs a computer to perform destructive activities, such as erasing a disk drive.
- a broad term that describes and program that is intended to cause harm or convey information to others withoutthe owner's permission.
20 Clues: a software that lets you open and display website. • a feature in internet explorer 8 that hepls detect phishing websites. • allows you to open more than one webpage at a time in a browser window. • verifies the indentity of a person or indicates the security of a website. • stores and organizes the link to the webpage that you want to revisit often. • ...
Chapter 1 Vocabulary 3 2015-02-23
Across
- A document that explains how to properly handle substances such as chemical solvents.
- The main board in the computer where the CPU, ROM chips, DIMMs, RIMMs, and interface cards are plugged into.
- A device used to measure various attributes of an electrical circuit-- most common measurements are voltage, current, and resistance.
- The program in system BIOS that can change the values in CMOS RAM.
- Measure of potential difference in an electrical circuit.
- A type of card that is a circuit board inserted into a slot on the motherboard to enhance the capability of the computer.
- The component where almost all processing of data and instructions takes place.
- A version of the ATX form factor that addresses some new technologies.
- A component in a computer or device that can be replaced without sending the computer or device back to the manufacturer.
- A self-diagnostic program used to perform a simple test of the CPU, RAM, and various I/O devices.
- A type of port designed to make installation and configuration of I/O devices easy, providing room for as many as 127 daisy-chained devices.
- A measure of electrical current.
Down
- The standard unit of measurement for electrical resistance.
- Memory used by the video controller.
- A set of specifications on the size, shape, and configuration of a computer hardware component.
- The other term for BIOS setup.
- Loose cables or cords in a traffic area where people can trip over them.
- A power connector with 15 pins that provides power to SATA drives.
- An older IDE cabling method that uses a 40-pin flat or round data cable or an 80-conductor cable and a 40-pin IDE connector.
- A test card installed in a slot on the motherboard that is used to help discover and report computer errors and conflicts that occur when a computer is first turned on and before OS is launched.
- The unit of electricity used to measure power.
- Firmware that can control much of a computer's input/output functions.
- BIOS that is responsible for controlling the computer when it is first turned on. It gives control over to the OS, once loaded.
23 Clues: The other term for BIOS setup. • A measure of electrical current. • Memory used by the video controller. • The unit of electricity used to measure power. • Measure of potential difference in an electrical circuit. • The standard unit of measurement for electrical resistance. • The program in system BIOS that can change the values in CMOS RAM. • ...
Computer Users health & safety 2022-08-30
Across
- The build-up of dust can (and surely does) impact your computer's performance for two main reasons: it causes the components of your computer to retain heat and it makes it more difficult for the internal fans to dissipate heat from the system, thereby decreasing the efficiency of the entire system.
- ...... a roughly be defined as the study of people in their working environment.
- This could be transferred by flash drives or CDs/DVDs from one computer to another and it has the potential of destroying your devices.
- is damage to the fingers and wrists due to repeated movements over a long period of time e.g. keying letters into keyboard.
- Do not put ...... objects into your computer system.
- ...... and tear of parts and circuitry is over time computers will wear down, simply because they are partial mechanical
- ......is an urgent, unexpected, and usually dangerous situation that poses an immediate risk to health, life, property, or environment and requires immediate action.
- Prolonged exposure to high ...... corrodes the components inside your computer, similar to the way damp air on a rainy day rusts metal left outdoors.
Down
- Pain that extends to the forearm to the hand, along with numbness and tingling in the thumb fingers.
- Also known as voltage fluctuation is a change in the power supply or voltage to electric appliances. Frequent power fluctuation can hamper the performance of electric appliances and reduce the life of appliances
- when the temperatures outside are extremely hot, it can shorten the lifespan of hardware inside your computer this is known as ......
- also called a directory, is a space used to store files, other folders, and shortcuts on a computer.
- Repetition, Lack of rest, and …. are the key factors of RSI .
- Computers are not always built perfectly, in which case the malfunction is the responsibility of the manufacturer ……… caused by them.
- Do not install or install computer software without a ........ permission.
- You should not change these without a teacher’s permission.
- Main used now for data storage. It should be ejected carefully from computers or you can corrupt your data.
- ...... are statements that say what a person is and isn't allowed to do. Following these prevents disorder.
- Creatures/pests not wanted in your computer or working environment.
- If you spill, they may cause short circuits or electric shocks inside the computers.
20 Clues: Do not put ...... objects into your computer system. • You should not change these without a teacher’s permission. • Repetition, Lack of rest, and …. are the key factors of RSI . • Creatures/pests not wanted in your computer or working environment. • Do not install or install computer software without a ........ permission. • ...
vocabulary crossword 2020-08-18
Across
- an act of selecting an option on an electronic interface by pressing a button or touching a screen.
- To copy the document, record or image being worked on to a storage medium. If the file has already been created on the hard disk, saving updates the file by writing the data currently in memory .
- is the process of replacing a product with a newer version of the same product.
- is so-called because it exists as a physical object.
- as to closely and quickly look at something, to use an electronic device to copy an image or text into a digital file, or to analyze verse into metrical verse.
- is a command that allows you to insert data from the clipboard into an application.
- resource for recording data discretely in a computer storage device.
- data is being sent from your computer to the Internet.
- is used to describe placing an object within another object.
- is to remove power from a computer's main.
- Is a pictogram or ideogram displayed on a computer screen in order to help the user navigate a computer system.
- is any information that is move from one location to another through some communication method.
- It temporarily stores files and folders before they are permanently deleted, allows you to delete items individually or restore them to their original location.
- refers to letting something go.
Down
- an act of selecting an option on an electronic interface by pressing a button or touching a screen.
- is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.
- is a collection of instructions that can be executed by a computer to perform a specific task.
- Describes the action of selecting an object or section of text and moving it, usually to drop in an alternate area.
- is new, improved, or fixed software, which replaces older versions of the same software.
- cease (or cause something to cease) business or operation.
- produce a paper copy of information stored on a computer.
- is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.
- is a file created by a software application.
- The storage area for information and applications.
- to mean "set up" or "put in place.
- the act of making the program ready for execution.
26 Clues: refers to letting something go. • to mean "set up" or "put in place. • is to remove power from a computer's main. • is a file created by a software application. • The storage area for information and applications. • the act of making the program ready for execution. • is so-called because it exists as a physical object. • ...
SeongHyeon Park_cross puzzle 2024-09-06
Across
- Firmware that initializes and tests hardware components during the computer's boot process.
- is a digital circuit used to perform arithmetic and logic operations
- A family of networking technologies used for local area networks
- is the primary component of a computer that acts as its “control center
- A storage device that uses spinning disks and magnetic storage to store data.
- A type of memory card used for storage in various devices.
- A standard for connecting peripheral devices to a computer and for data transfer.
- A small computer
- A video display interface used to connect a computer to a monitor.
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- Memory used to store data that is actively being used or processed by the computer.
- is an external storage array that supports only flash media for persistent storage
Down
- A hardware component that allows a computer to connect to a network.
- A processor designed for rendering graphics and performing parallel processing tasks.
- an interface for transferring data between a computer's central circuit board and storage devices
- is a standard interface used to connect storage devices, like hard disk drives, to computers
- is a type of flat panel display which uses liquid crystals in its primary form of operation
- A type of non-volatile memory used primarily in firmware and software that is not meant to be modified frequently.that, normally, can only be read, not written to.
- A standard for transmitting high-definition video and audio from a device to a display.
- A circuitry within a computer's processor that directs operations
- A user interface where interaction is done through text characters
- A storage device that uses flash memory to provide faster data access speeds compared to traditional hard drives.
- is a small and relatively inexpensive computer with a central processing unit (CPU) made up of a microprocessor
- A file system used by Windows operating systems that supports large volumes and files, as well as security features.
- A display standard and interface used to connect monitors to a computer, typically providing analog video output.
- that initializes and tests hardware components during the computer's boot process.
- A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units.
27 Clues: A small computer • A type of memory card used for storage in various devices. • A family of networking technologies used for local area networks • A circuitry within a computer's processor that directs operations • A user interface where interaction is done through text characters • A video display interface used to connect a computer to a monitor. • ...
Science and Technology 2022-04-13
Across
- _______ and you select the
- _______.You type in words on
- _______ can be used for sending and receiving emails and for word processing (writing reports, letters, etc). You can also use the
- _______ . A laptop is a small computer that you can carry around with you and
- _______ to play the computer games. You log in/on with your
- ________ . Information is displayed on the
Down
- _______ (small pictures or symbols) using a mouse.
- _______ and print out documents on a
- _______ is a very small, flat computer that you work by touching the screen.
- _______ . A computer you used at home or work is a PC or
- _______ and
- _______ (=information) is stored in
- _______ on the hard disk or on a flash drive and CD-ROM. The programmes that are used to operate the computer are called
13 Clues: _______ and • _______ and you select the • _______.You type in words on • _______ (=information) is stored in • _______ and print out documents on a • ________ . Information is displayed on the • _______ (small pictures or symbols) using a mouse. • _______ . A computer you used at home or work is a PC or • _______ to play the computer games. You log in/on with your • ...
Computer Crime 2022-11-28
Across
- a computer software that is used to hack a computer by making the program look as something good
- when someone sends a suspicious email so you fall into a scam
- People who hack a system with bad intentions
- a computer program that copies itself and workds by itself
- a security measure used to protect personal information
- Someone who hacks a system with good intentions
- a program that is designed to damage a computer and it spreads by copying and attaching itself to a program or file
Down
- a harmful software
- program that searchs and eliminates viruses
- undesired emails or messages that are sent to numerous people
- programs or instruction of a computer
- To harras or harm someone through a compuuter
- the physical parts of a computer
13 Clues: a harmful software • the physical parts of a computer • programs or instruction of a computer • program that searchs and eliminates viruses • People who hack a system with bad intentions • To harras or harm someone through a compuuter • Someone who hacks a system with good intentions • a security measure used to protect personal information • ...
Computer Crime 2022-11-28
Across
- A harmful software.
- People who hack a system with bad intentions.
- undesired emails or messages that are sent to numerous people.
- A computer program that copies itself and workds by itself.
- Program that searchs and eliminates viruses.
- A computer software that is used to hack a computer by making the program look as something good.
- Programs or instruction of a computer.
Down
- A security measure used to protect personal information.
- Someone who hacks a system with good intentions.
- A program that is designed to damage a computer and it spreads by copying and attaching itself to a program or file.
- To harras or harm someone through a compuuter.
- When someone sends a suspicious email so you fall into a scam.
- The physical parts of a computer.
13 Clues: A harmful software. • The physical parts of a computer. • Programs or instruction of a computer. • Program that searchs and eliminates viruses. • People who hack a system with bad intentions. • To harras or harm someone through a compuuter. • Someone who hacks a system with good intentions. • A security measure used to protect personal information. • ...
Computer equipment and phones 2021-10-22
Across
- It connects a piece of electrical equipment to the main supply of electricity.
- A part of a computer or a television on which pictures or words are shown.
- A small computer that is easy to carry, usually without a keyboard.
- It is used to carry electricity.
- You use it to charge your phone.
- You connect it to a computer to copy and store information.
Down
- You move it to select and move items on the computer screen.
- A machine for printing text on paper.
- A mobile phone that can be used as a small computer and connects to the internet.
- The set of letters that you touch to write on a smartphone, computer ...
- It produces sound.
- A small computer that can work with a battery and be easily carried.
12 Clues: It produces sound. • It is used to carry electricity. • You use it to charge your phone. • A machine for printing text on paper. • You connect it to a computer to copy and store information. • You move it to select and move items on the computer screen. • A small computer that is easy to carry, usually without a keyboard. • ...
TECHNOLOGY 2019-11-06
Across
- real-time, synchronous, text-based communication via computer
- code made up of numbers seperated by three dots that identifies a particular computer on the internet
- is a plug-and-play interface that allows a computer to communicate with peripheral and other devices
- what is a network security system used to stop unauthorised access
- device that feeds data into a computer
- process of converting data into a secret code for transmission over a public network
- small program that can be downloaded which allows users to enhance their browser
- a computer program sent to gather information from your computer
Down
- usually consists of eight bits
- what is it called if people are nasty to you online
- type of text and styles
- copy from one computer system to another, typically over the internet
12 Clues: type of text and styles • usually consists of eight bits • device that feeds data into a computer • what is it called if people are nasty to you online • real-time, synchronous, text-based communication via computer • a computer program sent to gather information from your computer • what is a network security system used to stop unauthorised access • ...
CYBERCRIME INVESTIGATION 2021-07-19
Across
- refers to a set of instructions executed by the computer to achieve intended results.
- the interactional space or environment created by linking computers together into a communication network.
- the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- means any card, plate, code, account number, electronic serial number, personal identification number, or other telecommunications service, equipment, or instrumental identifier, or other means of account access that can be used to obtain money, good, services, or any other thing of value or to initiate a transfer of funds
- the system of hardware,software, facilities and service components that support the delivery of business systems and digital-enabled processes.
- a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.
- It is when an individual or entity who has knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f) of the Act, intentionally or by omission conceals the fact of such security breach.
- an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
- refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic document.
- refers to the transmission of information through ICT media, including voice, video and other forms of data.
- t is when an individual or entity with malice or in bad faith, discloses unwarranted or false information relative to any personal information or sensitive personal information obtained by him or her
- refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which identity can be established
- any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175, Cyber Crime Prevention Act of 2012, DICT National Cyber Security 2022, and R.A. 10173, Data Privacy Act of 2012.
- refers to a secret code which secures and defends sensitive information that cross over public channels into a form decipherable only with a matching electronic key.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- is acquired and integrated to deliver and support the business outcomes, and the service objectives of cybercrime prevention and privacy protected data collection, retention, transmission, utilization, presentation, sharing, repurposing, and disposal.
- is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- represents the definitive view of the of privacy rights, privacy principles and security measuresin the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- is preservation of confidentiality, integrity and availability of
Down
- The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
- The access to the whole or any part of a computer system without right.
- refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.
- The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
- refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device.
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.
- physical security is most sensitive component, as prevention from cybercrime. Computer network should be protected from access of unauthorized persons.
- those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms.
- means transferring, or otherwise disposing of, to another, or obtaining control of, with intent to transfer or dispose of.
- refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- is about single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security.
- refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- It is when personal information is made accessible due to negligence and without being authorized by any existing law.
- refers to a person who is intended by the originator to receive the electronic data message or electronic document.
- malicious software programs which are infiltrated into computers disguised as benign applications or data.
- refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
- the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error,accidents, harm or any other event in the Cyberspace which could be considered non-desirable.
- The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
- surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- terrorist activity that targets computer networks and information systems for attack.
- the act of copying digital material posted online into the storage medium on one’s computer.
- The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same,
- refers to a computer or a computer network, the electronic medium in which online communication takes place.
- is the condition of being protected
- the right to be left alone; freedom from observation and interference from others.
50 Clues: is the condition of being protected • is preservation of confidentiality, integrity and availability of • The access to the whole or any part of a computer system without right. • the right to be left alone; freedom from observation and interference from others. • refers to a set of instructions executed by the computer to achieve intended results. • ...
Computer Vocabulary Terms 2014-08-26
Across
- punctuation mark basically a period.
- a place where, or a device through which, energy or information enters a system.
- an electronic device designed to accept data and perform prescribed mathematical and logical operations at high speed and display of these operations.
- computers a computer designed for use by one person at a time.
- a group or system of interconnected people or things.
- copy printed version on a paper of data held in a computer.
- brain of the computer.
- the act or process of orientating.
- unit a component of a computers central processing unit (CPU) that directs operation of the processor.
- line a location in a document where a visible digital signature can be inserted.
- a panel of keys that operate a computer or a typewriter
- is syntax to a computer programming language for defining data structures.
- containing structure or a layer.
- a long thin piece of metal on a scale or a dial that moves to indicate a figure or position.
- indicator that is used to show the position on a computer monitor
Down
- a fount.
- the amount of something produced by a person, machine, or industry.
- particular way of dealing with or considering something.
- looking for errors or omissions.
- skill or ability in a certain field.
- arrange or put into a format.
- symbol that indicates the position on a CRT or other type of display.
- a printed heading on stationary stating a persons or organizations name and address.
- the retention of retrievable data on a computer or other electronic system or memory.
- changing its contours or adding ornamental features.
- wrap a feature that automatically moves a word that is too long to fit on a line to the beginning of the next line.
- Photography. Any device for exposing an image on film , a sensitized plate by tracing light along a series of many closely spaced parallel lines.
- a drawing or sketch restricted to line without shading or modeling of form.
- selecting and preparing written, visual, audible and film media used to convey information.
- a key or command that toggles between two modes such as the caps lock key.
30 Clues: a fount. • brain of the computer. • arrange or put into a format. • looking for errors or omissions. • containing structure or a layer. • the act or process of orientating. • punctuation mark basically a period. • skill or ability in a certain field. • changing its contours or adding ornamental features. • a group or system of interconnected people or things. • ...
30 Computer Vocab Terms 2014-08-22
Across
- / the original draft of a diplomatic document.
- page / a page at the beginning of a book giving its title.
- Wrap / a feature that automatically moves a word that is too long to fit on a line to the beginning of the next line.
- Checker / a computer program that checks the spelling of words in text.
- / the action of showing something to be right or reasonable.
- / a note or record made for future use.
- Notation / a special notation at the end of a letter that indicates copies of the letter were sent to the person's listed.
- Business Letter / is written from an individual to a company or organization.
- / the study of people's efficiency in their working environment.
- / facts and statistics collected together for reference or analysis.
- Address / It provides the recipient to determine how to respond to the sender of the message if needed.
- / is short for Gross Words A Minute.
Down
- Software / is a set of one or more programs designed to carry out operations for a specific application.
- / the programs and other operating information used by a computer.
- Printer / a printer, linked to a computer, producing good-quality printed material.
- / To enter information into a computer.
- keyboard / with the letters q, w, e, r, t, and y.
- Spacing / the type of spacing where you would manually press the enter key four times.
- / the determination of the relative position of something or someone.
- Checker / it is a program, or part of a program, that attempts to verify written text for grammatical correctness.
- Processing / the production, storage, and manipulation of text on a computer or word processor.
- Letter / is usually a letter from one company to another.
- / a printed heading on stationery stating a person's or organization's name and address.
- Report / short reports that are prepared without binders or covers.
- / arrange or put into a format.
- / an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed.
- Software / is computer software designed to operate and control the computer hardware.
- Spacing / is the vertical distance between lines of text.
- technician / Serves customers by installing and servicing systems and products.
- copy / a printed version on paper of data held in a computer.
30 Clues: / arrange or put into a format. • / is short for Gross Words A Minute. • / To enter information into a computer. • / a note or record made for future use. • / the original draft of a diplomatic document. • keyboard / with the letters q, w, e, r, t, and y. • Letter / is usually a letter from one company to another. • ...
Tecnologie Informatiche 2018-11-28
Across
- Nel foglio di calcolo è preceduta dall'uguale (7)
- Sistema di numerazione legato alla tecnologia del funzionamento dei computer (7)
- Topo informatico (5)
- Programma per navigare in Internet che inoltra la richiesta di un documento alla rete e ne consente la visualizzazione una volta arrivato (7)
- La macchina di Turing fu ideata da Alan Turing per decrittare quale altra macchina...(6)
- Schermo (7)
- Insieme di computer interconnessi (4)
- Registrare dati su un CD/DVD (12)
- Serve per stampare un documento (9)
- Dispositivo per l'acquisizione di immagini e testo (7)
- Personal Computer (2)
- Programma in grado di cancellare o rovinare i file di un PC (5)
- Siti internet che forniscono agli utenti della rete dei punti d'incontro virtuale per scambiarsi messaggi, chattare, condividere foto e video, ecc. (2 parole, 13)
- Nome della chiavetta USB (8)
- Viene memorizzato su un supporto di memoria (4)
- Megabyte scritto con due lettere (2)
- Parte logica del PC (8)
- Persone che utilizzano i programmi (6)
- Una sequenza di 8 bit (4)
- Tasto che viene utilizzato assieme a C per copiare, assieme a X per tagliare e assieme a V per incollare (4)
- Simbolo di identificazione di un programma (5)
- Lavagna multimediale interattiva (3)
Down
- Tastiera e mouse sono dispositivi di ...(5)
- Dispositivo mobile che molte persone tengono in tasca (10)
- Insieme delle componenti fisiche del PC (8)
- Famoso motore di ricerca (6)
- Piccola telecamera del computer (6)
- Persona in grado di scrivere programmi per il computer (13)
- Foglio elettronico in inglese (11)
- Operazione per passare da un numero decimale a un numero binario (9)
- Periferica di input per inserire manualmente i dati (8)
- E' più grande del gigabyte (8)
- Contenitore preposto ad accogliere la maggior parte dei componenti di un computer (4)
- 1024 byte ne formano uno (8)
- Computer portatile di dimensioni ridotte (6)
- Scrivania del computer (7)
- Posta elettronica (5)
- Programma di elaborazione di testi e videoscrittura del software LibreOffice (6)
- Si scrive sempre prima dell'estensione (5)
- La più piccola unità di misura informatica (3)
- Programma di foglio elettronico del software LibreOffice (4)
- Compact Disc (2)
42 Clues: Schermo (7) • Compact Disc (2) • Topo informatico (5) • Personal Computer (2) • Posta elettronica (5) • Parte logica del PC (8) • Una sequenza di 8 bit (4) • Scrivania del computer (7) • Famoso motore di ricerca (6) • 1024 byte ne formano uno (8) • Nome della chiavetta USB (8) • E' più grande del gigabyte (8) • Registrare dati su un CD/DVD (12) • Foglio elettronico in inglese (11) • ...
Techno2 2024-07-14
Across
- Computing - The use of quantum-mechanical phenomena such as superposition and entanglement to perform computation.
- - A software application that runs automated tasks.
- Reality - The use of computer technology to create a simulated environment.
- Language Processing - The ability of a computer program to understand human language as it is spoken.
- - The branch of technology that deals with the design, construction, operation, and application of robots.
- Intelligence - The simulation of human intelligence by machines.
- Vehicles - Vehicles that are capable of sensing their environment and moving safely with little or no human input.
- Mining - The practice of examining large databases to generate new information.
- Learning - A subset of AI that involves the development of algorithms that allow computers to learn from and make predictions based on data.
- - The fifth generation of mobile network technology.
- Network - A computer system modeled on the human brain and nervous system.
- Analytics - The use of statistics and modeling techniques to predict future outcomes based on historical data.
- Science - An interdisciplinary field that uses scientific methods, processes, and algorithms to extract knowledge from data.
- Vision - A field of AI that trains computers to interpret and understand the visual world.
- Reality - Technology that overlays digital information on the real world.
- Home - A home equipped with lighting, heating, and electronic devices that can be controlled remotely by smartphone or computer.
Down
- - A system of recording information in a way that makes it difficult to change or hack.
- Technology - Technology that uses AI and machine learning to provide advanced services.
- - A network security system that monitors and controls incoming and outgoing network traffic.
- - The use of technology to perform tasks without human intervention.
- - Measures taken to protect a computer or computer system against unauthorized access or attack.
- - The process of converting information or data into a code to prevent unauthorized access.
- Technology - Electronic devices that are worn on the body as accessories or implants.
- Computing - The delivery of computing services over the internet.
- Data - Extremely large data sets that may be analyzed computationally.
- Computing - A distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
- of Things (IoT) - A network of physical objects embedded with sensors and software.
- Address - A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
- - A computer program designed to simulate conversation with human users.
- Learning - A subset of machine learning involving neural networks with many layers.
30 Clues: - A software application that runs automated tasks. • - The fifth generation of mobile network technology. • Intelligence - The simulation of human intelligence by machines. • Computing - The delivery of computing services over the internet. • - The use of technology to perform tasks without human intervention. • ...
Cybersecurity crossword 2022-05-18
Across
- company security policy that allows for employees’ personal devices to be used in business.
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
- malware that functions by spying on user activity without their knowledge.
- technology that allows access to files/services through the internet from anywhere in the world.
- acronym that stands for distributed denial of service – a form of cyber attack.
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A piece of malware that often allows a hacker to gain remote access to a computer through a back door
- software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
- udio or video clip that has been edited and manipulated to seem real or believable
- internet version of a home address for your computer
- hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- defensive technology designed to keep the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
- umbrella term that describes all forms of malicious software
- tool that allows the user to remain anonymous while using the internet
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
- malware that allows cybercriminals to remotely control your computer.
- technique used to manipulate and deceive people to gain sensitive and private information
- form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
- group of computers, printers and devices that are interconnected and governed as a whole
- set of programs that tell a computer to perform a task
- Breaches the network to gain sensitive information with the owner’s consent
- this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- technique used by hackers to obtain sensitive information.
- piece of malware that can replicate itself in order to spread the infection to other connected computers
25 Clues: internet version of a home address for your computer • set of programs that tell a computer to perform a task • defensive technology designed to keep the bad guys out • technique used by hackers to obtain sensitive information. • umbrella term that describes all forms of malicious software • malware that allows cybercriminals to remotely control your computer. • ...
Vocab Review - Weeks 1-7 | 2025 2025-02-21
Across
- The central ‘processing’ unit of a computer.
- Another word for tiny bits of data that flow through the Internet till they get to their destination.
- You save a document on Google Drive, you save it to here. (It’s not really ‘fluffy.’)
- It means ‘to be concealed’ and is a feature on a web browser to avoid being tracked.
- To create a ‘grid’ in a Google document, you click on ‘INSERT’ and select this option.
- The college dropout took a class which gave him the idea of a computer company. What unusual class was this?
- The internal storage device in a computer.
- Thomas Edison’s ‘Voice Tube’ was called this.
- What the Internet was called when it was part of the Defense Department Advanced Research project.
- What the station master taught Thomas Edison after he saved his son’s life.
- In addition to the mouse, Doug Engelbart demonstrated this new way to link documents.
- Data about a person that might include a retina scan or facial geometry. Definitely PII!
- First name of the inventor of the World Wide Web
Down
- Any external device that provides input and output for the computer.
- A first working model of an invention meant to demonstrate. It’s not perfect.
- Last name of the cofounder of Apple computers.
- When there is a two-way flow of information between devices, you call this experience this. (See Engelbart handout.)
- The keyboard command for searching a word on a website, or any document.
- The tiny rectangle of hardware that ‘knows’ which circuits to use, and does math calculations.
- A person who operated a mainframe. She was called this!
- A competitor to AMD that manufactures microprocessors.
- One of Steve Jobs’ investments had more to do with movies than hardware.
- The part of the Web often not accessible to us because they are password protected.
- The main circuit board inside a computer on which is the CPU, Hard Drive, and RAM.
- What the earliest computer was called before we called it a computer. It filled a room!
- The second word of RAM
- Information that could specifically identify you: Three letters.
- What kind of software would be Linux or Windows? Not Application software, it’s_________ software.
28 Clues: The second word of RAM • The internal storage device in a computer. • The central ‘processing’ unit of a computer. • Thomas Edison’s ‘Voice Tube’ was called this. • Last name of the cofounder of Apple computers. • First name of the inventor of the World Wide Web • A competitor to AMD that manufactures microprocessors. • ...
Final activity #1 2024-11-21
Across
- is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
- An action or event that has the potential to compromise and/or violate
- The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
- is a state of well-being of information and infrastructures.
- An individual who breaks into computer systems to steal, change, or destroy information.
- may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
- ensuring that the information/data can be accessed only by those authorized
- ensuring that the information is accessible to authorized persons when required without delay
- It is the Characteristics of the culture of computers, information, technology and virtual reality
- A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
Down
- the identification and assurance of the origin of information.
- Unauthorized access of or interference with computer systems, servers, or other information and communication systems
- is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
- Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
- An act or instance of using or closely imitating the language and thoughts of another author without authorization
- Any action derived from intelligent threats to violate the security of the
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
- ensuring that the information is accurate, complete, reliable, and is in its original form.
- A defined method of breaching the security of an IT system through vulnerability.
20 Clues: is a state of well-being of information and infrastructures. • the identification and assurance of the origin of information. • An action or event that has the potential to compromise and/or violate • Any action derived from intelligent threats to violate the security of the • ensuring that the information/data can be accessed only by those authorized • ...
magnani termini 2022-01-12
Across
- Marchio che indica la protezione dei diritti d’autore.
- Area di lavoro visualizzata sullo schermo e dedicata a un’applicazione.
- È il singolo punto luminoso del monitor.
- Memoria interna al processore, ad altissima velocità di accesso.
- Programma che può provocare danni temporanei o permanenti in un computer.
- Immissione, ingresso, indica i dati di ingresso in un programma.
- Posta elettronica, ossia messaggi inviati tramite computer collegati a Internet.
- Tipo di sistema operativo a interfaccia grafica.
- Computer portatili dalle prestazioni simili a quelle dei personal computer.
- sistema di numerazione in cui si utilizzano due soli numeri 0 e 1.
- tavolo di lavoro sul quale sono posti degli oggetti da richiamare con il mouse.
- Parti di una pagina web inserite in cornici e indipendenti l’una dall’altra.
- Dizionario dei sinonimi e contrari.
- Memoria di sola lettura utilizzata per istruzioni che non debbono essere cambiate.
- programma in grado di individuare un virus e di bloccarlo.
- supporto per la memorizzazione dei dati.
- È la scheda principale dove sono collegati tutti i componenti hardware del computer.
Down
- Collegamento tra un documento e un altro.
- contiene file e altre cartelle.
- Processo di estrazione dei dati da un database secondo certi criteri.
- Insieme dei dispositivi elettronici e meccanici del computer.
- Sono i collegamenti utilizzati per connettere periferiche dotate di questo tipo di interfaccia.
- insieme di 8 bit.
- Singolo documento di lavoro individuato da un nome.
- Codice segreto per accedere a risorse e informazioni riservate.
- Operazione che permette di caricare o scaricare dalla rete un file sul proprio computer che permette di caricare o scaricare dalla rete un file sul proprio computer.
- programma che permette l’accesso a internet e delle pagine web.
- Sigla utilizzata per indicare i possibili problemi legati all’anno 2000, pericolo di blocco dei sistemi informatici che utilizzano di due sole cifre per indicare l’anno.
- cifra binaria.
- profilo di un utente.
- Insieme completo di caratteri con lo stesso stile.
- Unità di memoria di massa di dimensioni superiori a quelle del floppy disk.
- Prospetto stampato che contiene i dati estratti da un database.
- È la principale unità di memorizzazione dei dati.
- Disegno di dimensioni ridotte che richiama la funzione ad essa associata.
35 Clues: cifra binaria. • insieme di 8 bit. • profilo di un utente. • contiene file e altre cartelle. • Dizionario dei sinonimi e contrari. • È il singolo punto luminoso del monitor. • supporto per la memorizzazione dei dati. • Collegamento tra un documento e un altro. • Tipo di sistema operativo a interfaccia grafica. • È la principale unità di memorizzazione dei dati. • ...
Science and Technology 2022-04-13
Across
- _______ and you select the
- _______.You type in words on
- _______ can be used for sending and receiving emails and for word processing (writing reports, letters, etc). You can also use the
- _______ . A laptop is a small computer that you can carry around with you and
- _______ to play the computer games. You log in/on with your
- ________ . Information is displayed on the
Down
- _______ (small pictures or symbols) using a mouse.
- _______ and print out documents on a
- _______ is a very small, flat computer that you work by touching the screen.
- _______ . A computer you used at home or work is a PC or
- _______ and
- _______ (=information) is stored in
- _______ on the hard disk or on a flash drive and CD-ROM. The programmes that are used to operate the computer are called
13 Clues: _______ and • _______ and you select the • _______.You type in words on • _______ (=information) is stored in • _______ and print out documents on a • ________ . Information is displayed on the • _______ (small pictures or symbols) using a mouse. • _______ . A computer you used at home or work is a PC or • _______ to play the computer games. You log in/on with your • ...
Technical stuff 2013-11-22
Across
- the device used to scroll and click on a computer is called what?
- the screen is also refered to as the?
- Who invented apple?
- the device used to type words on a computer is called what?
- who founded the microsoft company?
- who uses the IOS system on thier products?
Down
- you cant have a computer without a...
- the main part of a computer is always what?
- this crossword is for Mr.____?
- what part of the computer protects the internal parts of the computer?
- in terms of computers, what is the abbreviation for computer processing unit?
11 Clues: Who invented apple? • this crossword is for Mr.____? • who founded the microsoft company? • you cant have a computer without a... • the screen is also refered to as the? • who uses the IOS system on thier products? • the main part of a computer is always what? • the device used to type words on a computer is called what? • ...
Computer Parts 2021-09-15
Across
- A device that allows you to input letters, numbers symbols into a computer
- Allows users to print items on paper
- Memory or information storage for the computer
- A small computer contained on an integrated circuit
Down
- A video screen used for display
- A small disc that stores computer data or music
- A special circuit that controls what is shown on the computer
- Memory that keeps it's content even when the computer is off
- A device that moves the cursor and select functions
- A data storage device for the computer
- Used to allow users to perform specific actions
11 Clues: A video screen used for display • Allows users to print items on paper • A data storage device for the computer • Memory or information storage for the computer • A small disc that stores computer data or music • Used to allow users to perform specific actions • A device that moves the cursor and select functions • A small computer contained on an integrated circuit • ...
Computer Parts 2021-09-15
Across
- Memory that keeps it's content even when the computer is off
- A small computer contained on an integrated circuit
- Used to allow users to perform specific actions
- A device that allows you to input letters, numbers symbols into a computer
- A special circuit that controls what is shown on the computer
Down
- A data storage device for the computer
- Allows users to print items on paper
- A video screen used for display
- A small disc that stores computer data or music
- Memory or information storage for the computer
- A device that moves the cursor and select functions
11 Clues: A video screen used for display • Allows users to print items on paper • A data storage device for the computer • Memory or information storage for the computer • Used to allow users to perform specific actions • A small disc that stores computer data or music • A small computer contained on an integrated circuit • A device that moves the cursor and select functions • ...
TECHNOLOGY VOCABULARY 2021-07-07
Across
- a unit of measurement of information
- a program used to view HTML documents
- transfer a file or program to a smaller computer
- RAM memory that is set aside as a specialized buffer storage
- crime committed using a computer and the internet
- adjusting the parts of something in relation to each other
Down
- a security system preventing access to a computer or network
- a part of RAM used for temporary storage of data
- a facial expression represented by a sequence of characters
- an online journal where people post about their experiences
- having an output that is proportional to the input
- fix a computer program piecemeal until it works
- a fault or defect in a computer program, system, or machine
- any small compartment
14 Clues: any small compartment • a unit of measurement of information • a program used to view HTML documents • fix a computer program piecemeal until it works • a part of RAM used for temporary storage of data • transfer a file or program to a smaller computer • crime committed using a computer and the internet • having an output that is proportional to the input • ...
Introduction to Autodesk Inventor 2024-01-07
Across
- A technical process in which engineering or design-related personnel use computer systems and software to draft architecture or objects
- Introduced in 1982
- Computer Aided Manufacturing
- A fundamental aspect that focuses on the creation, representation, and manipulation of digital models.
- The usage of CAD systems were primarily used in the _______ industry
- CAD
- Founded Autodesk, Inc.
- Is the core of simultaneous engineering
Down
- An integrated ______ that contains all the functions of a central processing unit of a computer
- An integrated package of mechanical CAE software tools
- A method of designing and developing products simultaneously
- The use of computer-based software to aid in design processes
- Introduced in 1999
- Massachusetts Institute of Technology
- A computerized method for predicting how a product reacts to real-world forces
- Computer Aided Drafting
16 Clues: CAD • Introduced in 1982 • Introduced in 1999 • Founded Autodesk, Inc. • Computer Aided Drafting • Computer Aided Manufacturing • Massachusetts Institute of Technology • Is the core of simultaneous engineering • An integrated package of mechanical CAE software tools • A method of designing and developing products simultaneously • ...
Review MID TEST ICT P1 2024-09-18
Across
- A computer is called a . . .
- All Buttons on Keyboard are called ___________________________________.
- CPU stands for . . .
- Machines help us to save . . .
Down
- A computer runs on . . .
- We can solve . . . on a computer.
- Machines are made by . . .
- CPU is the . . . of a computer.
- A computer works very . . .
- The Mouse is always kept on a . . .
- Machines make our work be . . .
11 Clues: CPU stands for . . . • A computer runs on . . . • Machines are made by . . . • A computer works very . . . • A computer is called a . . . • Machines help us to save . . . • CPU is the . . . of a computer. • Machines make our work be . . . • We can solve . . . on a computer. • The Mouse is always kept on a . . . • ...
Parts of a Computer by Aden Baruch 2019-02-07
Across
- The computers short term memory
- fan A fan that cools down the computer to make sure it doesn’t overheat
- Creates sound from the computer
- A display screen used to provide visual output from a computer
- A circuit in the computer that controls everything
Down
- Used to scroll around a computer
- Used to type words on a computer
- card A printed circuit board controlling output to a display screen
- pad Something you put your mouse on to not ruin the surface it’s on
- An interface between the computer and other computers or peripheral devices
- drive A storage device
11 Clues: drive A storage device • The computers short term memory • Creates sound from the computer • Used to scroll around a computer • Used to type words on a computer • A circuit in the computer that controls everything • A display screen used to provide visual output from a computer • card A printed circuit board controlling output to a display screen • ...
National Cybersecurity Month 2022-09-16
Across
- SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING
- A SCAM BY WHICH AN EMAIL USER IS DUPED INTO REVEALING PERSONAL OR CONFIDENTIAL INFORMATION WHICH THE SCAMMER CAN USE ILLICITLY
- AN INTEGRATED COLLECTION OF SECURITY MEASURES DESIGNED TO PREVENT UNAUTHORIZED ELECTRONIC ACCESS TO A NETWORKED COMPUTER
- A COMPUTER THAT IS UNDER COTNROL OF A MALICIOUS HACKER WITHOUT THE KNOWLEDGE OF THE COMPUTER OWNER
- A PROGRAM THAT IS DESIGNED TO HARM A COMPUTER BY DELETING DATA, RUINING FILES, & THAT CAN BE SPREAD SECRETLY FROM ONE COMPUTER TO ANOTHER
Down
- COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER
- THE ACT OF OBTAINING OR ATTEMPTING TO OBTAIN OTHERWISE SECURE DATA BY CONNING AN INDIVIDUAL INTO REVEALING SECURE INFORMATION
- MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK
- A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM
- USUALLY A SMALL SELF-CONTAINED & SELF REPLICATING COMPUTER PROGRAM THAT INVADES COMPUTERS ON A NETWORK AND USUALLY PERFORMS A DESTRUCTIVE ACTION
- EMAIL THAT IS NOT WANTED, EMAIL THAT IS SENT TO LARGE NUMBERS OF PEOPLE AND CONSISTS OF MOSTLY ADVERTISING
11 Clues: SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING • A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM • COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER • MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK • ...
Cybersecurity Words 2020-11-18
Across
- a common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct malicious or unauthorized activity.
- An observable occurrence or sign that an attacker may be preparing to cause an incident.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- set of instructions to help IT staff detect, respond to, and recover from network security incidents.
- a type of cyber attack that disrupts its normal functions and prevents other users from accessing it.
- a situation in which a person or program successfully identifies as another by falsifying data, to gain and illegitimate advantage.
- ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.
- strategy used to make sure users do not send critical information outside of a corporate network.
- an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
- integrated collection of security measures to prevent unauthorized access to a networked computer system
- a cyberattack on a server, service, website, or network floods it with Internet traffic.
- identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
- the unauthorized movement of information being spread throughout the internet.
- Authentication via group
- a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
- used to detect malware.
- a system that allows web hosts to distinguish between human and automated access to websites.
- Someone or Something that authenticates
- a standalone malware computer program that replicates itself in order to spread to other computers.
- science concerned with data communication and storage in secure and usually secret form.
- related to cloud computing, in which it can hold information and photos.
- to successfully escape from an area under enemy control.
- Source code that is free to copy and modify.
- an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.
- Hacker who violates computer security for personal gain or malice.
- is the method where knowledge of internal and external information weakness of a particular organization are tested against real-world cyberattacks.
- The attack of a Software environment where an unauthorized user can try to enter data to or extract data from said environment.
- a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Down
- an evaluation of events that can adversely affect operations and/or specific assets
- a type of monitoring software designed to record keystrokes made by a user.
- Source code that is not available
- the psychological manipulation of people into performing actions or divulging confidential information.
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- software that displays unwanted advertisements on your computer.
- the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- code that takes advantage of a vulnerability of flaw.
- a set of changes to a computer program or its supporting data designed to update, fix, or improve it
- an advanced attack method, where attackers intrude their target organization through small companies that work with the target company.
- List of people under suspicion, disfavor, etc.
- internet protocol address, which identifies the number associated with a specific computer or network.
- an individual or group that acts, or has the power, to exploit a vulnerability or conduct other damaging activities.
- are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
- any malware which misleads users of its true intent.
- A thing that supports another thing
- Someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
- an attack on the internet that is used to steal usernames and passwords from the network.
- a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
- a deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud.
- keeping data safe
- process of collecting and searching through a database to discover information.
- a computer network that provides online privacy by creating an encrypted connection on the Internet.
- it ensures a person’s identity matches with who they are.
- a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one of more of them with malware.
- a person who operates the command and control of botnets for remote process execution.
- when data is coded a certain way to disallow others from seeing that information.
- a collection of internet-connected devices infected by malware that allow hackers to control them.
- offensive security professionals who are experts in attacking systems and breaking into defenses.
- a type of malware that is often disguised as legitimate software.
- unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
- identifies the information assets that could be affected by a cyber attack, such as hardware, systems, laptops, customer data and intellectual property.
- the methods that adversaries use to breach or infiltrate your network.
- Number generated from a string of text
- malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- to convert information into cipher
- short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.
65 Clues: keeping data safe • used to detect malware. • Authentication via group • Source code that is not available • to convert information into cipher • A thing that supports another thing • Number generated from a string of text • Someone or Something that authenticates • Source code that is free to copy and modify. • List of people under suspicion, disfavor, etc. • ...
Computer equipment and phones 2021-10-22
Across
- It connects a piece of electrical equipment to the main supply of electricity.
- A part of a computer or a television on which pictures or words are shown.
- A small computer that is easy to carry, usually without a keyboard.
- It is used to carry electricity.
- You use it to charge your phone.
- You connect it to a computer to copy and store information.
Down
- You move it to select and move items on the computer screen.
- A machine for printing text on paper.
- A mobile phone that can be used as a small computer and connects to the internet.
- The set of letters that you touch to write on a smartphone, computer ...
- It produces sound.
- A small computer that can work with a battery and be easily carried.
12 Clues: It produces sound. • It is used to carry electricity. • You use it to charge your phone. • A machine for printing text on paper. • You connect it to a computer to copy and store information. • You move it to select and move items on the computer screen. • A small computer that is easy to carry, usually without a keyboard. • ...
computer systems crossword 2016-06-21
Across
- is used to describe physical parts of computer monitors, keyboards etc.
- is the amount of something produced by a machine
- is an electronic data storage
- a device on which information can be saved
- is a small electronic device containing flash memory that is used for storing data or transferring it to or from a computer
Down
- is a set of instructions to follow in order to run for all computers
- is a 3D printing, also known as additive manufacturing
- (Central Processing Unit) is the core of every Personal Computer
- is the process of entering data into a computer system
- is the part of the computer which processes or deals with the data
- is a machine which responds to instructions to computer a task
- is a magnetic storage device for digital data.
12 Clues: is an electronic data storage • a device on which information can be saved • is a magnetic storage device for digital data. • is the amount of something produced by a machine • is a 3D printing, also known as additive manufacturing • is the process of entering data into a computer system • is a machine which responds to instructions to computer a task • ...
J3 TECHNOLOGY 2025-05-07
Across
- These play music or sounds loudly so everyone can hear.
- A small computer you can carry and use anywhere.
- A small tool you move with your hand to click on things on the computer.
- The part of a computer or TV you look at.
- You use this to type letters and numbers on a computer.
- A device you use to work, play games, or go online.
Down
- You wear these on your ears to listen to music quietly.
- flat computer with a touchscreen, like a big phone.
- A phone you can carry with you to call, text, or go online.
- A device that puts words or pictures from the computer onto paper, it can make photocopies.
- A device that takes pictures or videos.
- A device that shows movies, shows, and news.
12 Clues: A device that takes pictures or videos. • The part of a computer or TV you look at. • A device that shows movies, shows, and news. • A small computer you can carry and use anywhere. • flat computer with a touchscreen, like a big phone. • A device you use to work, play games, or go online. • You wear these on your ears to listen to music quietly. • ...
steam 2024-10-01
Across
- A set of instructions that a computer executes to achieve a particular objective.
- Something put into a system, such as resources, information, or signals, in order to achieve a result.
- A flaw in a computer program that causes the program to produce an incorrect result or behavior.
- An ordered set of instructions that are used to carry out a task.
- A simulator that imitates a program or events.
- To identify bugs or errors in computer hardware or programs and fix them.
- A diagram that represents an algorithm, work flow, or process, and uses geometric symbols connected by arrows to show the direction of the flow of action.
- Scientists who apply their knowledge of computation to creating solutions using a computer system.
- Repeating process steps to continuously improve a work product.
- A small computer on a single integrated circuit containing a processor, memory, and programmable inputs and outputs.
Down
- A drag-and-drop programming environment where code blocks snap together to form a program.
- The science of creating solutions and solving problems using the help of a computer. Some of the areas of focus include software engineering, programming, data analysis, algorithms, graphics, and animation.
- A program that translates instructions or code into a language that can be read and understood by a computer.
- The process of solving problems using a series of steps.
- (LED) A semiconductor diode that emits light when conducting current.
- A method to analyze and record information about a program's execution.
- Something unexpected that happens while a program is running.
17 Clues: A simulator that imitates a program or events. • The process of solving problems using a series of steps. • Something unexpected that happens while a program is running. • Repeating process steps to continuously improve a work product. • An ordered set of instructions that are used to carry out a task. • ...
computer puzzle 2025-05-27
Across
- using the language and thoughts of other persons as ones original work
- acknowleding the original writer and the source it is taken
- the computer that communicate with each other
- multiple mismatch copies stored in different computers
- criminal activities done by the use of computer or internet to harm someone
- metropolitan area network
Down
- sending bulk of mail to destroy the server
- computer program that disrupts the normal functioning of the computer
- duplication of data at multiple places
- the highly technical people who secretly break into computer to steal information
- the main cable is the backbone of this network
- computer network restricted to an organization
12 Clues: metropolitan area network • duplication of data at multiple places • sending bulk of mail to destroy the server • the computer that communicate with each other • the main cable is the backbone of this network • computer network restricted to an organization • multiple mismatch copies stored in different computers • ...
Dov'è l'AI? 2026-01-08
Across
- Gas prodotto indirettamente quando si usa energia elettrica.
- Strumento come computer o telefono usato dallo studente.
- Insieme di cavi, antenne e router che trasportano i dati.
- Sistema per abbassare la temperatura dei server.
- Componente del computer molto potente che consuma molta energia.
- Sistema informatico che risponde alle domande usando calcoli matematici.
- Rete che permette alle domande e alle risposte di viaggiare.
Down
- Effetto prodotto dai computer quando lavorano molto.
- Computer molto potenti che elaborano le richieste degli utenti.
- Ciò che serve per far funzionare computer e reti.
- Grandi edifici pieni di computer dove lavorano le intelligenze artificiali.
- Risorsa usata per raffreddare i server nei data center.
12 Clues: Sistema per abbassare la temperatura dei server. • Ciò che serve per far funzionare computer e reti. • Effetto prodotto dai computer quando lavorano molto. • Risorsa usata per raffreddare i server nei data center. • Strumento come computer o telefono usato dallo studente. • Insieme di cavi, antenne e router che trasportano i dati. • ...
Computers 2015-02-13
Across
- to have a short conversation with someone on a computer using either text or voice.
- to ensure the words you enter into a computer are correct.
- to write data to a disk drive so it is not lost.
- to turn a computer off and then on because there is a problem.
- to turn on a computer and load the operating system.
Down
- to make a copy of all files on a computer for security.
- to copy information from the internet from the internet to a computer.
- to photograph a paper document so it can be used electronically.
- to speak to another person using computers, using voice or video.
- to look at different websites on the internet.
- a Computer stops working because there is a problem.
- to search for information on the internet.
12 Clues: to search for information on the internet. • to look at different websites on the internet. • to write data to a disk drive so it is not lost. • a Computer stops working because there is a problem. • to turn on a computer and load the operating system. • to make a copy of all files on a computer for security. • ...
Computer equipment and phones 2021-10-22
Across
- It connects a piece of electrical equipment to the main supply of electricity.
- A part of a computer or a television on which pictures or words are shown.
- A small computer that is easy to carry, usually without a keyboard.
- It is used to carry electricity.
- You use it to charge your phone.
- You connect it to a computer to copy and store information.
Down
- You move it to select and move items on the computer screen.
- A machine for printing text on paper.
- A mobile phone that can be used as a small computer and connects to the internet.
- The set of letters that you touch to write on a smartphone, computer ...
- It produces sound.
- A small computer that can work with a battery and be easily carried.
12 Clues: It produces sound. • It is used to carry electricity. • You use it to charge your phone. • A machine for printing text on paper. • You connect it to a computer to copy and store information. • You move it to select and move items on the computer screen. • A small computer that is easy to carry, usually without a keyboard. • ...
Computer Terminology 2021-11-19
Across
- Conducts electricity.
- The brain of the computer
- A device which can be slotted into a computer to allow the use of audio components for multimedia applications.
- A program used to start the computer when you turn it on
- electronic storage that comes build in the device
- super-fast and temporary data storage space that a computer needs
Down
- A connector for a device that sends or receives several bits of data simultaneously by using more than one wire.
- A small processor
- This component oversees converting electricity into low voltage DC power.
- super-fast and temporary data storage space that a computer needs
- The standard plug to attach peripheral devices to a computer.
- A circuit board inside the computer
- A connector by which a device that sends data one bit at a time may be connected to a computer.
13 Clues: A small processor • Conducts electricity. • The brain of the computer • A circuit board inside the computer • electronic storage that comes build in the device • A program used to start the computer when you turn it on • The standard plug to attach peripheral devices to a computer. • super-fast and temporary data storage space that a computer needs • ...
Motherboard 2025-02-19
Across
- a collection of electronic components on a motherboard that manages the flow of data between the CPU, GPU, RAM, storage, and peripherals
- Where do things like headphones get plugged in?
- What is used to connect storage devices to your computer?
- Main circuit board of the computer. Has on it the CPU, memory boards, device boards, power plugs, etc.
- The box that converts power into the computer.
Down
- Allows you to connect expansion cards to your computer.
- This part needs to start before you can operate the computer.
- Connects external devices to the computer.
- The outlet that allows you to exchange data with an external device.
- Main memory. Volatile memory that is erased when power is turned off.
- Generates pixels that creates images.
- The brain of the computer.
12 Clues: The brain of the computer. • Generates pixels that creates images. • Connects external devices to the computer. • The box that converts power into the computer. • Where do things like headphones get plugged in? • Allows you to connect expansion cards to your computer. • What is used to connect storage devices to your computer? • ...
Anatomy Of A Computer Crossword 2022-09-19
Across
- Supplies image to graphic organizer
- Brain of the computer
- improves sound quality
- Houses most computer components
- Supports functions on processor
- connects personal computers,audio, video
Down
- Converts system with power
- connects mouse and keyboard to computer
- sends information to peripheral device
- stores data relating to open programs
- store files on usb for later use
- socket connects to a serial interface
- starts a computer system,after shut off
13 Clues: Brain of the computer • improves sound quality • Converts system with power • Houses most computer components • Supports functions on processor • store files on usb for later use • Supplies image to graphic organizer • stores data relating to open programs • socket connects to a serial interface • sends information to peripheral device • connects mouse and keyboard to computer • ...
ICT Terms & Concepts 2021-09-13
Across
- Term associated with data stored on servers
- Manners online
- A harmful program
- A storage device
- A study of how to make the work environment comfortable
- To change the appearance of a document
- Copying someone else's work and using it as your own
- The act of doing something over and over again
Down
- Intimidating or threatening someone online
- How I can protect my files and data on my devices
- To receive data from the computer
- The fastest computer
- The position in which someone holds their body when sitting or standing
- Computer _____ Syndrome (CVS)
- Someone who gains illegal access to your computer
- An example of a popular search engine
- Allows me to quickly move from one document to the next on the internet
17 Clues: Manners online • A storage device • A harmful program • The fastest computer • Computer _____ Syndrome (CVS) • To receive data from the computer • An example of a popular search engine • To change the appearance of a document • Intimidating or threatening someone online • Term associated with data stored on servers • The act of doing something over and over again • ...
Pl 2014-11-27
Across
- A box that you use to get the internet.
- When you erase something.
- When you click on a link and a website appears for example.
- A shortcut for cut.
- Something where you can save your file, out from your computer.
- A problem like when your computer stop, crash.
- Looking for something.
- When you put something on your computer’s memory.
- A shortcut to search something.
- Something with a screen and a keyboard.
- Make something disappear.
Down
- The thing that open itself when you go in internet.
- A free software which anybody can add it.
- Put a computer file on paper.
- Something that enable you to listen to CDs.
- Make a picture with a pencil or crayon.
- Give a level up to something.
17 Clues: A shortcut for cut. • Looking for something. • When you erase something. • Make something disappear. • Put a computer file on paper. • Give a level up to something. • A shortcut to search something. • A box that you use to get the internet. • Make a picture with a pencil or crayon. • Something with a screen and a keyboard. • A free software which anybody can add it. • ...
2B 2025-04-16
INPUT/OUTPUT/PROCESS 2021-04-14
Across
- INPUT DEVICE TO SELECT OBJECTS ON COMPUTER.
- COMPUTER WORKS ON _____ CYCLE.
- DEVICES THAT ARE USED TO GIVE INSTRUCTIONS TO THE COMPUTER ARE CALLED ________ DEVICES.
- THE RESULT THAT WE GET FROM THE COMPUTER.
- AN INPUT DEVICE THAT IS USED TO TYPE NUMBERS AND ALPHABETS.
- AN INPUT DEVICE THAT IS USED TO SEND IMAGES TO A COMPUTER.
Down
- A BLACK BLINKING LINE OF THE SCREEN IS _________.
- ________ IS AN INPUT DEVICE THAT CAPTURE A PHOTOGRAPH.
- THE OUTPUT WE GET ON THE PAPER IS CALLED _________.
- OUTPUT DEVICE THAT IS ALSO KNOWN AS VDU.
- OUTPUT DEVICE THAT IS USED TO GET OUTPUT ON THE PAPER.
- THE INSTRUCTION THAT WE GIVE TO THE COMPUTER.
12 Clues: COMPUTER WORKS ON _____ CYCLE. • OUTPUT DEVICE THAT IS ALSO KNOWN AS VDU. • THE RESULT THAT WE GET FROM THE COMPUTER. • INPUT DEVICE TO SELECT OBJECTS ON COMPUTER. • THE INSTRUCTION THAT WE GIVE TO THE COMPUTER. • A BLACK BLINKING LINE OF THE SCREEN IS _________. • THE OUTPUT WE GET ON THE PAPER IS CALLED _________. • ...
ICT Terms & Concepts 2021-09-13
Across
- A harmful program
- An example of a popular search engine
- To receive data from the computer
- How I can protect my files and data on my devices
- Computer _____ Syndrome (CVS)
- The fastest computer
- Allows me to quickly move from one document to the next on the internet
- A study of how to make the work environment comfortable
- Copying someone else's work and using it as your own
Down
- Term associated with data stored on servers
- The position in which someone holds their body when sitting or standing
- A storage device
- The act of doing something over and over again
- Manners online
- Intimidating or threatening someone online
- Someone who gains illegal access to your computer
- To change the appearance of a document
17 Clues: Manners online • A storage device • A harmful program • The fastest computer • Computer _____ Syndrome (CVS) • To receive data from the computer • An example of a popular search engine • To change the appearance of a document • Intimidating or threatening someone online • Term associated with data stored on servers • The act of doing something over and over again • ...
Computer Terms by Connor Barton 2015-01-28
Across
- to move a cursor on a computer screen.
- system the software that supports a computer's basic functions.
- disk drive read-only memory in Technology Expand. storage.
- the machines, wiring, and other physical components of a computer or other electronic system.
- maintain regular surveillance over.
- the programs and other operating information used by a computer.
- sound, especially when recorded, transmitted, or reproduced.
- a thin sheet metal enclosure the mother board.
Down
- supply gives power to the computer
- video Disk Drive An optical storage medium with improved capacity
- main circut
- a panel of keys that operate a computer or typewriter.
- disk drive is a hardware device that reads data storage information.
- disk drive is the mechanism that controls the positioning
14 Clues: main circut • supply gives power to the computer • maintain regular surveillance over. • to move a cursor on a computer screen. • a thin sheet metal enclosure the mother board. • a panel of keys that operate a computer or typewriter. • disk drive is the mechanism that controls the positioning • disk drive read-only memory in Technology Expand. storage. • ...
