types of computer Crossword Puzzles
Job occupations (20 pts) 2024-05-20
Across
- paints houses
- attends passengers
- charges your bills
- takes away your waste
- takes photos
- fix computers
- puts out a fire
- cleans the office
- types letters
- cures patients
Down
- catches criminal people
- cooks food
- brings your restaurant order
- cuts the grass
- cares patients
- bakes breads
- catches fix
- fixes water pipes
- flies an airplane
- teaches any subject
20 Clues: cooks food • catches fix • bakes breads • takes photos • paints houses • fix computers • types letters • cuts the grass • cares patients • cures patients • puts out a fire • fixes water pipes • flies an airplane • cleans the office • attends passengers • charges your bills • teaches any subject • takes away your waste • catches criminal people • brings your restaurant order
Anatomy of a Computer 2021-09-16
Across
- Allows you to add devices like modems
- Holds the computer's graphic card
- Carries the computer's instructions
- Port You can attach old keyboards and mice in it
- Used to connect many types of peripherals
- many peripherals need this for connections
- Foundation of a computer
Down
- Port Old peripherals need this to connect
- Most peripherals require it
- It supplies power through multicolored cables
- Card Can be used if your motherboard does not have a sound chip
- Stores information in your computer
- Lets the processor communicate with the peripherals
13 Clues: Foundation of a computer • Most peripherals require it • Holds the computer's graphic card • Carries the computer's instructions • Stores information in your computer • Allows you to add devices like modems • Port Old peripherals need this to connect • Used to connect many types of peripherals • many peripherals need this for connections • ...
Parts of a Computer 2024-02-06
Across
- Used for better sound quality
- The brain that carries out the computer's instructions
- Funnels power through multicolored cables
- Connects many different types of peripherals without rebooting the computer
- Transfers data from computer to peripherals
- Allows peripherals to communicate quickly with the processor
- Used to connect older printers/scanners
Down
- Holds most of the computer's components
- Holds the graphics card
- Used to connect the mouse and keyboard
- Also known as the communications port
- Performs system checks before starting your main OS
- Stores temporary information
13 Clues: Holds the graphics card • Stores temporary information • Used for better sound quality • Also known as the communications port • Used to connect the mouse and keyboard • Holds most of the computer's components • Used to connect older printers/scanners • Funnels power through multicolored cables • Transfers data from computer to peripherals • ...
Anatomy Of A Computer 2020-02-04
Across
- Attach to one of the motherboard's PCI slots
- Much slower than new USB and FireWire ports
- Used to connect many different types of peripherals
- Purple keyboard port and green mouse port
- Let peripherals communicate and able to add devices like modems and sound cards
- Able to draw power from the computer through the USB port and transfer data
- Redirects excess data to your hard drive
- Houses your graphics card
Down
- The brain that carries out the computer's instructions
- USB and FireWire connections are quickly replacing this
- Houses most computer components
- Activates when you turn on the computer and lets the processor communicate
- Funnels power through the multicoloured cables to each device
13 Clues: Houses your graphics card • Houses most computer components • Redirects excess data to your hard drive • Purple keyboard port and green mouse port • Much slower than new USB and FireWire ports • Attach to one of the motherboard's PCI slots • Used to connect many different types of peripherals • The brain that carries out the computer's instructions • ...
anatomy of a computer - Emma 2015-07-28
Across
- The central command of your computer that gives instructions
- Connected to devices such as older printers or scanners.
- A chip located all motherboards which actives when turning on the computer and preforms system checks.
- The place where the CPU stores temporary information.
- It supplies the image to the monitor.
- to get a better sound quality
Down
- Attach some older keyboards,mice etc.
- it connects many different types of peripherals.
- It's slots leet peripherals communicate quickly with the processor.
- Directs data traffic to and from the appropriate devices. It is like the heart of your computer.
- Are often used in the old time but are still used by some as an older port.
- Funnels power through the multicolored cables to each device.
- To draw power from the computer in addition to data through the port
13 Clues: to get a better sound quality • Attach some older keyboards,mice etc. • It supplies the image to the monitor. • it connects many different types of peripherals. • The place where the CPU stores temporary information. • Connected to devices such as older printers or scanners. • The central command of your computer that gives instructions • ...
Anatomy Of A Computer 2020-02-04
Across
- attach to one of the motherboard's PCI slots
- Much slower than new USB and FireWire ports
- Used to connect many different types of peripherals
- Purple keyboard port and green mouse port
- let peripherals communicate and able to add devices like modems and sound cards
- Able to draw power from the computer through the USB port and transfer data
- Redirects excess data to your hard drive
- Houses your graphics card
Down
- The brain that carries out the computer's instructions
- USB and FireWire connections are quickly replacing this
- Houses most computer components
- Activates when you turn on the computer and lets the processor communicate
- Funnels power through the multicoloured cables to each device
13 Clues: Houses your graphics card • Houses most computer components • Redirects excess data to your hard drive • Purple keyboard port and green mouse port • Much slower than new USB and FireWire ports • attach to one of the motherboard's PCI slots • Used to connect many different types of peripherals • The brain that carries out the computer's instructions • ...
Introduction to Computer Networks Chapter 2025-02-11
Across
- A private internet
- The process of adding IP addresses and then MAC addresses to chunks of data is called
- represented by collections of 8 bits, called a ____
- is a computer program stored in nonvolatile memory, such as ROM or flash memory
- The _______ control data transfers between memory, expansion slots, I/O devices, and the CPU.
- A network that allows limited and controlled access to internal network resources by outside users.
- ther types of nontraditional computers include smartphones, smart watches, home assistants like Amazon Echo and Google Home,
- information added at the end of data is called a ______
Down
- the more well-known term, is often used generically to mean a chunk of data sent over the network.
- The most obvious are network _______ and workstations that run operating systems, such as Windows, Linux, UNIX, and Mac OS X.
- A bus is a collection of wires carrying data from one place to another on the computer.
- The brain of a computer
- The username and password for accessing a computer are called
- The function of this ____ is to tell the CPU to perform certain tasks when power is first applied to the computer
- A _____ is a packet with the source and destination MAC addresses added to it.
- It holds a 1 or 0 value
- Information added at the front of data is called a ____
17 Clues: A private internet • The brain of a computer • It holds a 1 or 0 value • represented by collections of 8 bits, called a ____ • Information added at the front of data is called a ____ • information added at the end of data is called a ______ • The username and password for accessing a computer are called • ...
Fifth part. Job occupations crossword (20 pts) 2024-05-22
Across
- paints houses
- teaches any subject
- fix computers
- cuts the grass
- bakes breads
- puts out a fire
- cares patients
Down
- fixes water pipes
- types letters
- take photos
- attends passengers
- cleans offices
- catches fix
- flies an airplane
- cures patients
- charges your bills
- catches criminal people
- takes away your waste
- brings your restaurant order
- cooks food
20 Clues: cooks food • take photos • catches fix • bakes breads • types letters • paints houses • fix computers • cleans offices • cures patients • cuts the grass • cares patients • puts out a fire • flies an airplane • attends passengers • charges your bills • teaches any subject • takes away your waste • catches criminal people • brings your restaurant order • fixes water pipes
Online Safety 2023-11-13
Across
- – Malicious code embedded in a data or program file, spread from one device to another by opening an executable file. A virus is spread by human action.
- – Criminal acts using computers, networks and/or the Internet
- – Software that has advertisements embedded into the program
- – Software that detects and removes spyware from a computer
- – Malware that locks a computer system or encrypts computer files until a “ransom” fee is paid
- – Electronic junk mail
Down
- Forensics – Investigation and analysis techniques that gather and preserve data from a computing device
- Theft – All types of crime in which someone obtains and uses another person’s personal data in a way that involves fraud or deception, typically for economic gain
- – Hardware or software that blocks unauthorized communications to or from your computer; helps prevent hackers from accessing your computer
- – Person who uses the Internet to access personal or business computers without permission
- – A variation of phishing using SMS (short message service) to send misleading text messages
- – Short for “malicious software;” includes viruses and spyware that steal personal information, send spam and commit fraud
- – Email sent that misrepresents the sender as legitimate and with the intent of having the recipient reveal private information that can be used for identity theft
- – A subclass of virus that can travel without being attached to a program or data file and without human action; a worm can replicate itself thousands of times
- – Malware that appears to be a legitimate program, but when activated often causes loss or theft of computer data
- logger or keylogger – Software that can record every keystroke you make on your computer. Used to record and capture data input. (Keyloggers are often used by employers to ensure computer use is work-related)
16 Clues: – Electronic junk mail • – Software that detects and removes spyware from a computer • – Software that has advertisements embedded into the program • – Criminal acts using computers, networks and/or the Internet • – Person who uses the Internet to access personal or business computers without permission • ...
Programming Crossword 2017-03-06
Across
- A general purpose programming language created by Larry Wall
- A dynamic, reflective, object-oriented, general-purpose programming language created by Yukihiro Matsumoto
- A graphical way of representing an algorithm
- An electronic experience using programming languages played on a console or computer
- Able to be used on different types of computers or with different software packages
- A programming language that supports scripts
- A concurrent, class-based, object-oriented programming language, first appearing in 1995
- A functional programming language designed by Guy L. Steele and Gerald Jay Sussman
Down
- A widely used programming language created by Guido van Rossum
- An imperative and procedural programming language created by Niklaus Wirth
- A computer programming language of binary or hexadecimal instructions which a computer can respond to directly
- a programming paradigm that uses statements that change a program's state
- A step by step process to be followed by the computer
- A verbose, business oriented programming language
- A visual programming language designed for students
15 Clues: A graphical way of representing an algorithm • A programming language that supports scripts • A verbose, business oriented programming language • A visual programming language designed for students • A step by step process to be followed by the computer • A general purpose programming language created by Larry Wall • ...
Programming Crossword 2017-03-06
Across
- A graphical way of representing an algorithm
- A computer programming language of binary or hexadecimal instructions which a computer can respond to directly
- An electronic experience using programming languages played on a console or computer
- A widely used programming language created by Guido van Rossum
- An imperative and procedural programming language created by Niklaus Wirth
- A functional programming language designed by Guy L. Steele and Gerald Jay Sussman
- A programming language that supports scripts
- A dynamic, reflective, object-oriented, general-purpose programming language created by Yukihiro Matsumoto
Down
- a programming paradigm that uses statements that change a program's state
- Able to be used on different types of computers or with different software packages
- A concurrent, class-based, object-oriented programming language, first appearing in 1995
- A step by step process to be followed by the computer
- A verbose, business oriented programming language
- A visual programming language designed for students
- A general purpose programming language created by Larry Wall
15 Clues: A graphical way of representing an algorithm • A programming language that supports scripts • A verbose, business oriented programming language • A visual programming language designed for students • A step by step process to be followed by the computer • A general purpose programming language created by Larry Wall • ...
RU ITEC 411 - Crime and Security 2025-04-14
Across
- (3 words separated by '-') these types of threat actors perform malicious activities with intent to cause harm to their victims. Their motivations are most times aligned with financial gain or embarrassment of the victim.
- a software fix that mitigates a known vulnerability within a computer system
- (3 words separated by '-') a type of cyber-attack that sends a server an influx of traffic to bog down the server and cause the service to malfunction preventing users from accessing or using the service
- (2 words separated by '-') the act of manipulating people in order to obtain personal information, behavior patterns or interests of the victim that can then be used to laterally build an attack against the victim
- types of information that threat actors use in order to build profiles on their victims. This type of data can be collected using publicly available, mostly online, resources. Some versions of this information include social media posts, public database records and etc.
- this is a type of malware that is designed to monitor a victims actions online. Some types of this malware can log a victims keystrokes, and activate webcams on victims computers or mobile devices. Then the information is logged and then sent to a threat actors designated server space.
- any criminal activity that is conducted against a computer system, targeting a computer system or is being used to obtain data for use in crime via the internet.
- (2 words separated by '-') a type of malware that is introduced into a victims system by running an infected application. The malware performs and initiates other types of malware attacks like installing a virus or sending spam emails.
- a type of malware that attaches to and spreads from resource to resource by self-replication
Down
- this is a type of malware that encrypts files on a victim's computer and in order to decrypt them the victim would be prompted to pay by a deadline or run the risk of all the data being released or destroyed
- a weakness or flaw that threat actors exploit to execute their attacks on a system
- the intentional access of a system to which the user has not been authorized access by a designated party
- a tactic used by threat actors to gather information to build a dossier on a victim. They obtain information by sending mass emails or text that are disguised as being sent by legitimate organizations (i.e. Amazon, PayPal, the IRS etc.) messages to get a victim to either provide information or click a link and provide their information.
- the ideology of hacking for “the greater good”. These types of hackers are considered white-hat hackers who attack based on political motivations.
- (3 words separated by '-') these types of threat actors perform hacking activities designed to identify vulnerabilities and improve overall system security
- the manipulation of telephone communications to bypass the need to pay for phone calls or obtain access into other systems on the network
- a device installed into card swipers found on POS terminals and ATMS to collect users credit/debit card numbers and PIN numbers to conduct credit card/debit card fraud on the victim.
- a type of malware that has many similarities to a virus. The main difference is that this type does not need other resources to evolve and cause extensive harm
- a tactic of cybersecurity professionals and threat actors where they present as a trusted/reputable source to solicit information or gain an advantage within their attack or investigation.
- a type of software that allows for circumvented access to a system without having to abide by a system's security features. They are often installed to aid law enforcement investigations but most times they are installed in order to provide threat actors with an easy way back into the system while they perform reconnaissance or the actual attack.
20 Clues: a software fix that mitigates a known vulnerability within a computer system • a weakness or flaw that threat actors exploit to execute their attacks on a system • a type of malware that attaches to and spreads from resource to resource by self-replication • ...
computer 5 2012-12-08
Across
- logger a program, sometimes part of a Trojan horse, that Records computer activity, such as a user's keystrokes, emails, sites visited, and chat session And then sends them to a system admin. or remote hacker.
- rules determining the format and transmission of data
- device A device that is attached to the computer and aids in input and/or output, or storage capabilities such as printer
- processor begins fetching a second instruction before it completes the machine cycle for the first instruction
- 1024 bytes or 1,000 bytes
- animation that shows 3D subjects moving in rapid, jerky ways that are impossible in the real world
- system A computer system that collects, stores and processes info. Usually within the content of an organization
- language A programming language that is designed to be easy for a computer to execute; also called "machine language" or "assembly language."
- . A way of organizing a collection of docum. By assigning an address to each and providing a way to link from one address to another
- framework A concept developed by James Wetherbe to help identify problems in an information system. Each letter of PIECES stands for a potential problem (Performance, Information, Economics, Control, Efficiency, and Service).
- in terms of spreadsheets: common text used to describe data
- an email based scam that’s designed to fool users into reveling confidential info.
- 802.11 x standards: standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands
- Local Area Network: interconnected gp. of computers & peripherals located within a relative limited area, such as a building or campus
- transfer data from one computer to another via a cable that links connecting ports
Down
- Stuffing An unpopular practice of including a huge variety of keywords in the header of an HTML document in the hopes that a search engine will display it even when the content of the page is not relevant to the search.
- type The structure of a record, including the names, length, and data types for each field. 615
- The process of superimposing a grid over a vector image and determing the color depth for each pixel.
- the illegal copying and selling of movies without permission of copyright holder
- Internet Service Provider. A company that provides internet access to a business, organization or individual
- an application that allows the user to create and save slides to use as a slide show
- packet Internet groper: command on TCP/IP network that sends a test pkt. to a specified Ip address and waits for a relpy
- a scratch pad area of the microprocessor which holds data or instructions and are moved so that they can be processed
- the core module of an OS that typically manages memory, processes, tasks and storage devices.
- exploit that automatically redirects the user to a fake web site
- data types a data type specifying that a field in a data file is used to store true/ false or yes/no data
- Info that is conveyed to computer
- Joint Photographic Experts Group: a format that uses lossy compression to store bitmap images
- error a run-time error in the logic or design of a computer program
- An operating system based on UNIX, maintained by volunteers, and distributed for free. Linux is used mostly in servers and embedded computers, but is growing in popularity as a PC operating system.
- chart program evaluation and review technique chart : a project management techniques that displays interconnected events and milestones on a time line
- liquid crystal display. Technology used for slat panel computer screens, typically notebooks
- Post Office Protocol .Or POP3. A standard for retrieving email message from an email server
- Random Access Memory: computer memory circuitry that holds data, program instructions and the operating system while the computer is on.
34 Clues: 1024 bytes or 1,000 bytes • Info that is conveyed to computer • rules determining the format and transmission of data • in terms of spreadsheets: common text used to describe data • exploit that automatically redirects the user to a fake web site • error a run-time error in the logic or design of a computer program • ...
Browsing safely 2025-05-19
Across
- It refers to an illegally en try into a Computer system
- grooming the process of 'befriend'children on social media
- Is a software that hells in preventing unauthorised access to a computer
- Fraud The use of illegal method to get money to get money
- Theft It refers go the act of stealing someone's personal information
- Is a collection of Technologies designed to protect Network ,Computers from unauthorised access
- an act of harming using information technology in a deliberate manner
- It is an act oc sending email to a user,misleading jim to believes that it is from trusted person
Down
- Criminal activity intended to harm anyone using a Computer
- Is designed to prevent and removed virus from a Computers
- extract confidential information from users and use this
- it is the program that disrupts the normal functioning of a Computer
- is fooled into believing that the message recieved by him is from A trusted source s
- What is Mcafee is a popular s software
- and password What are the Two types of Two step authentic atin for login
15 Clues: What is Mcafee is a popular s software • It refers to an illegally en try into a Computer system • extract confidential information from users and use this • Is designed to prevent and removed virus from a Computers • Criminal activity intended to harm anyone using a Computer • Fraud The use of illegal method to get money to get money • ...
Unit 1 - Killer Crossword 2013-09-16
Across
- To work together
- Swipe and speech are examples of...
- Everything inside a system unit
- The brain of the computer
- Hardware that isn't inside the system unit
- Used to store components safely
- Functions or the uses of a computer
- Start-up code that enables the O/S to be loaded and allows the computer to start-up successfully
- Components of a computer that allows CDs or DVDs to play.
- RAM & ROM
- Grouping word for ROM and RAM
- another name for backing storage.
- A small tool/device
- Changing or doing something with the data
- A device used with a GUI to control cursor or a pointer
- The term used to describe a group of pages that are run on the internet
- The first component that the electricity goes to
- A kind of storage which stores more files than usual but it's not a component
- A system allowing computers to connect to networks using wireless communication
- Collections of data
- The programs, instructions and data that enables the computer to carry out task
- Non-volatile
- Another types of keyboard other than QWERTY
- Physical part of a computer
Down
- Performing or carrying out tasks
- The more ______ the device, the easier you can carry it with you
- A special kind of computer chip that can be used in both computers and other computerised devices.
- Like a pen for use with a touch screen
- An input device that allows the user to control a process or select icons by touching the screen
- Application software that allows the user to view or interact with pages from the internet
- All the components of the computer connect to this
- Operating system that is used in iphones, ipads and ipods
- Another name for a computer chip
- Magnetic or optical storage devices
- The place where you save your work
- Another name for "Main memory"
- ROM is...
- A problem that desktop computers rarely have
- Satellite navigation
- Devices that allow large amount of data to be stored outside of main memory
- New
- A complete set of instructions that can be used to carry out a task
- Connect computers together
- Volatile
- The most common type of keyboard
45 Clues: New • Volatile • RAM & ROM • ROM is... • Non-volatile • To work together • A small tool/device • Collections of data • Satellite navigation • The brain of the computer • Connect computers together • Physical part of a computer • Grouping word for ROM and RAM • Another name for "Main memory" • Everything inside a system unit • Used to store components safely • Performing or carrying out tasks • ...
ICT 2017-06-25
Across
- A program that allows people to publicly share videos
- A type of application from Microsoft and allows people to use pages to write on
- A form of coding that can easily take someone somewhere with a click of a button
- A system inside of a device, that is not physical
- A type of global computer network
- A personal data base which is stored in computers or portable
- Software and Hardware
- A group or system of interconnected things
- A type of database program
- A piece of hardware used to type letters into a computer
- Type of hardware used with a monitor and a keyboard
- The abbreviation for Extensible Hyper Text Markup Language
Down
- A group of binary digits
- A person or company that generates applications for others
- A form of 1 billion bytes
- A type of hardware which allows a group of people to use internet
- A form of 1 sextillion bytes
- The action of using the code language
- A type of scripting language
- The most essential part of a computer. It contains the CPU, memory and connectors for input and output devices
- A Uniform resource locater
- A type of code that uses pixels and squares to link the user to something
- Different types of hardware
- A type of folder used in a computer
- A device that can produce something
- A recording of visual images
26 Clues: Software and Hardware • A group of binary digits • A form of 1 billion bytes • A Uniform resource locater • A type of database program • Different types of hardware • A form of 1 sextillion bytes • A type of scripting language • A recording of visual images • A type of global computer network • A type of folder used in a computer • A device that can produce something • ...
RU ITEC 411 - Crime and Security 2025-04-14
Across
- a type of malware that has many similarities to a virus. The main difference is that this type does not need other resources to evolve and cause extensive harm
- the intentional access of a system to which the user has not been authorized access by a designated party
- types of information that threat actors use in order to build profiles on their victims. This type of data can be collected using publicly available, mostly online, resources. Some versions of this information include social media posts, public database records and etc.
- (3 words separated by '-') a type of cyber-attack that sends a server an influx of traffic to bog down the server and cause the service to malfunction preventing users from accessing or using the service
- a type of software that allows for circumvented access to a system without having to abide by a system's security features. They are often installed to aid law enforcement investigations but most times they are installed in order to provide threat actors with an easy way back into the system while they perform reconnaissance or the actual attack.
- a type of malware that attaches to and spreads from resource to resource by self-replication
- the manipulation of telephone communications to bypass the need to pay for phone calls or obtain access into other systems on the network
- the ideology of hacking for “the greater good”. These types of hackers are considered white-hat hackers who attack based on political motivations.
- this is a type of malware that is designed to monitor a victims actions online. Some types of this malware can log a victims keystrokes, and activate webcams on victims computers or mobile devices. Then the information is logged and then sent to a threat actors designated server space.
- a device installed into card swipers found on POS terminals and ATMS to collect users credit/debit card numbers and PIN numbers to conduct credit card/debit card fraud on the victim.
Down
- a tactic of cybersecurity professionals and threat actors where they present as a trusted/reputable source to solicit information or gain an advantage within their attack or investigation.
- this is a type of malware that encrypts files on a victim's computer and in order to decrypt them the victim would be prompted to pay by a deadline or run the risk of all the data being released or destroyed
- (3 words separated by '-') these types of threat actors perform malicious activities with intent to cause harm to their victims. Their motivations are most times aligned with financial gain or embarrassment of the victim.
- (2 words separated by '-') a type of malware that is introduced into a victims system by running an infected application. The malware performs and initiates other types of malware attacks like installing a virus or sending spam emails.
- a tactic used by threat actors to gather information to build a dossier on a victim. They obtain information by sending mass emails or text that are disguised as being sent by legitimate organizations (i.e. Amazon, PayPal, the IRS etc.) messages to get a victim to either provide information or click a link and provide their information.
- any criminal activity that is conducted against a computer system, targeting a computer system or is being used to obtain data for use in crime via the internet.
- (3 words separated by '-') these types of threat actors perform hacking activities designed to identify vulnerabilities and improve overall system security
- a software fix that mitigates a known vulnerability within a computer system
- a weakness or flaw that threat actors exploit to execute their attacks on a system
- (2 words separated by '-') the act of manipulating people in order to obtain personal information, behavior patterns or interests of the victim that can then be used to laterally build an attack against the victim
20 Clues: a software fix that mitigates a known vulnerability within a computer system • a weakness or flaw that threat actors exploit to execute their attacks on a system • a type of malware that attaches to and spreads from resource to resource by self-replication • ...
Generic Sample Of A Puzzle 2023-02-02
10 Clues: shoes • warm season • survival game • favorite subject • my favorite candy • a small furry animal • a lemon type of drink • the color of the ocean • people you are born with • other types of living things
murder most horride keywords! 2012-03-21
Across
- a sauce of information given on a computer.
- a collaborative website that can be directly edited using only web browser.
- key A Key Field or Primary Key is a field within a database which enables every record to be uniquely identified.
- when data is ordered in a spesific criteria.
- the title above the database name.
- view applications such as Access allow you to view the contents of a table.
- merge This is a technique for creating many letters or documents based on a template and a database of names and addresses.
- staying safe on the computer.
- read,write or edit a shared on-line.
- detachable compartments of a spacecraft.
Down
- types different types of data are usually classified as a certain.
- a form of data used to find out more about some one or some thing.
- learning envirment a virtrual classroom which lets teacher a students to communicate whith each other.
- when you ask a puestion.
- foot print data trace or tail left by someone's activity in a digital envirment.
- browser a software application that provides a way to view and interact with pages on the World Wide Web.
- a policy facility to meet for open discussion.
- view where you see the structure of the table rather than the contents.
- making a search asyer.
19 Clues: making a search asyer. • when you ask a puestion. • staying safe on the computer. • the title above the database name. • read,write or edit a shared on-line. • detachable compartments of a spacecraft. • a sauce of information given on a computer. • when data is ordered in a spesific criteria. • a policy facility to meet for open discussion. • ...
Computer Acronyms 2024-09-06
Across
- A standard interface designed for IBM PC-compatible computers.
- An electron-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
- A type of non-volatile memory used in computers and other electronic devices.
- A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
- A proprietary journaling file system developed by Microsoft in the 1990s.
- An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed.
- A small economy car made by the British Motor Corporation.
- Used to interact with computer programs with text-based commands.
- The most important processor in a given computer.
- A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
- Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process
- A component of Microsoft Windows that provides system administrators and advanced users an interface for configuring and monitoring the system.
Down
- A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
- A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers.
- A video display interface developed by the Digital Display Working Group.
- A specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics.
- A video display controller and accompanying de facto graphics standard.
- A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
- A solid-state storage device.
- A combination digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
- A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
- A computer hardware component that connects a computer to a computer network.
- An industry standard that allows data exchange and delivery of power between many types of electronics.
- A small, relatively inexpensive computer having a central processing unit made out of a microprocessor.
25 Clues: A solid-state storage device. • The most important processor in a given computer. • A small economy car made by the British Motor Corporation. • A standard interface designed for IBM PC-compatible computers. • Used to interact with computer programs with text-based commands. • A video display controller and accompanying de facto graphics standard. • ...
Electronic devices 2021-12-13
Across
- drive A small piece of equipment that you connect to a computer or other piece of electronic equipment to copy and store information
- A small piece of equipment that you move across a desk etc. in order to move the cursor on your computer screen
- The set of keys on a computer or typewriter that you press in order to make it work
- USB cable assemblies are some of the most popular cable types available, used mostly to connect computers to peripheral devices such as cameras, camcorders, printers, scanners, and more.
- a flat vertical surface on which pictures or words are shown
- A things use to listen to the sound or music
Down
- The part of a radio, television, or computer, or of a piece of electrical equipment for playing recordedsound, through which the sound is played
- cable USB cable assemblies are some of the most popular cable types available, used mostly to connect computers to peripheral devices such as cameras, camcorders, printers, scanners, and more
- a place, usually in a wall, where you can connect electrical devices to the electricity supply.
- control Things to control everything at a distance
10 Clues: A things use to listen to the sound or music • control Things to control everything at a distance • a flat vertical surface on which pictures or words are shown • The set of keys on a computer or typewriter that you press in order to make it work • a place, usually in a wall, where you can connect electrical devices to the electricity supply. • ...
Information Technology- system computer(level 2) 2020-05-28
Across
- ... computer is the transmission of data in continuous wave form.
- What do an IT professional do? They are the people who test, build, install, repair, or maintain the hardware and ...
- ... computer is the transmission of data using distinct on and off electrical states.
- Electronic devices that can follow instructions to accept input, process that input and produce information.
- Set of instructions that directs the hardware to accomplish a task.
Down
- Physical component of the computer such as mouse and monitor.
- ... system is the most important software that runs on a computer such as Windows and Linux
- input, processing, output and storage are the ... of computer functions.
- ...software is a program or group of programs designed for end users such as Powerpoint and Word.
- ... and supercomputer is the types of computer.
10 Clues: ... and supercomputer is the types of computer. • Physical component of the computer such as mouse and monitor. • ... computer is the transmission of data in continuous wave form. • Set of instructions that directs the hardware to accomplish a task. • input, processing, output and storage are the ... of computer functions. • ...
Computer Acronyms 2024-09-06
Across
- A standard interface designed for IBM PC-compatible computers.
- An electron-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
- A type of non-volatile memory used in computers and other electronic devices.
- A type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
- A proprietary journaling file system developed by Microsoft in the 1990s.
- An electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed.
- A small economy car made by the British Motor Corporation.
- Used to interact with computer programs with text-based commands.
- The most important processor in a given computer.
- A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
- Firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process
- A component of Microsoft Windows that provides system administrators and advanced users an interface for configuring and monitoring the system.
Down
- A family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
- A flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals combined with polarizers.
- A video display interface developed by the Digital Display Working Group.
- A specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics.
- A video display controller and accompanying de facto graphics standard.
- A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
- A solid-state storage device.
- A combination digital circuit that performs arithmetic and bitwise operations on integer binary numbers.
- A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
- A computer hardware component that connects a computer to a computer network.
- An industry standard that allows data exchange and delivery of power between many types of electronics.
- A small, relatively inexpensive computer having a central processing unit made out of a microprocessor.
25 Clues: A solid-state storage device. • The most important processor in a given computer. • A small economy car made by the British Motor Corporation. • A standard interface designed for IBM PC-compatible computers. • Used to interact with computer programs with text-based commands. • A video display controller and accompanying de facto graphics standard. • ...
David Crossword 2023-12-08
Across
- regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
- Installing into the device gets all its information
- or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
- Personal Identifiable Information
- physical computer
- protects computers and or websites
- central processing unit
- portable document format
- 0s and 1s up to 8 of them
- its used in the router for the wifi
- iCloud or save on your computer.
- to boot is to start up a computer to reboot is to, reboot is a restart
- Address internet protocol
- Read only memory
- turns domain names into IP addresses, which browsers use to load internet pages.
- text markup language the address of a web-page
- Google,bing
- software that is distributed with its source code, making it available for use, modification, and distribution with its original rights.
- For copy its control C for paste its control V
Down
- It's the circuit board that connects all of your hardware to your processor, distributes electricity from your power supply, and defines the types of storage devices, memory modules, and graphics cards among other expansion cards that can connect to your PC.
- connects devices to a network
- code
- data from a website that is stirred in your computer
- keyboard and mouse
- data storage device
- the gap between demographics and regions that have access to modern information and communications technology ICT and those that don't or have restricted access.
- internal parts pf computer
- computer-generated environment with scenes and objects that appear to be real, making the user feel they are immersed in their surroundings
- random-access memory
- protecting information or data by using mathematical models to scramble it
- malicious intent to cause harm or steal info on your computer
- nput ,output,memory and processing.
- data that is eight binary digits
- monitor or speaker
- connects u to the wifi
- Google Chrome,Opera GX
- Smallest unit of data
- working systems in a computer
38 Clues: code • Google,bing • Read only memory • physical computer • keyboard and mouse • monitor or speaker • data storage device • random-access memory • Smallest unit of data • connects u to the wifi • Google Chrome,Opera GX • central processing unit • portable document format • 0s and 1s up to 8 of them • Address internet protocol • internal parts pf computer • connects devices to a network • ...
Crossword thing. 2013-10-09
14 Clues: Types. • Screen. • Your memory. • Scans stuff. • Inputs audio. • Outputs audio. • Read only memory. • Random acess memory. • The brain on the CPU • Holds everthing together • Saves if you loose power • The brains of the computer • Does not save if you loose power • Takes space up from the hard drive
Deions crossword 2023-12-07
Across
- For copy its control C for paste its control V
- Address internet protocol
- Google Chrome,Opera GX
- or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
- data storage device
- physical computer
- data from a website that is stirred in your computer
- code
- turns domain names into IP addresses, which browsers use to load internet pages.
- random-access memory
- iCloud or save on your computer.
- It's the circuit board that connects all of your hardware to your processor, distributes electricity from your power supply, and defines the types of storage devices, memory modules, and graphics cards among other expansion cards that can connect to your PC.
- working systems in a computer
- regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
- Google,bing
- internal parts pf computer
- the gap between demographics and regions that have access to modern information and communications technology ICT and those that don't or have restricted access.
- monitor or speaker
Down
- computer-generated environment with scenes and objects that appear to be real, making the user feel they are immersed in their surroundings
- software that is distributed with its source code, making it available for use, modification, and distribution with its original rights.
- connects devices to a network
- keyboard and mouse
- malicious intent to cause harm or steal info on your computer
- text markup language the address of a web-page
- to boot is to start up a computer to reboot is to, reboot is a restart
- Read only memory
- protects computers and or websites
- data that is eight binary digits
- Installing into the device gets all its information
- nput ,output,memory and processing.
- 0s and 1s up to 8 of them
- central processing unit
- its used in the router for the wifi
- portable document format
- Personal Identifiable Information
- protecting information or data by using mathematical models to scramble it
- connects u to the wifi
- Smallest unit of data
38 Clues: code • Google,bing • Read only memory • physical computer • keyboard and mouse • monitor or speaker • data storage device • random-access memory • Smallest unit of data • Google Chrome,Opera GX • connects u to the wifi • central processing unit • portable document format • Address internet protocol • 0s and 1s up to 8 of them • internal parts pf computer • connects devices to a network • ...
COMPUTER TERMS 2015-09-15
Across
- Approximately 1 billion byte.
- The set devices of the computer system that can be physically seen.
- A measurement of the clarity of an image based on the number of pixel used to create the image.
- The rules guiding the use of a command.
- A pictorial symbol on computer screen that represents a choice of activity.
- Output on paper from computer.
- Means Binary digits. Is the smallest unit of a computer memory.
- A dedicate device that incorporates all the parts of a processor on a single chip.
- A computer professional who writes programs, or sets of instruction for each application, debugs, and then documents them.
- A collection of web pages, normally on a single theme, on the Internet.
- A manual device connected as to a video game, with a control lever that can be tilted in various directions to move the cursor or part of the display.
- A device that; allows an image that already exists to be input to the computer so that it can be manipulated using special software.
- A set of instruction for processing data.
- disk A microcomputer storage device that can typically store between 10 and 100 or more million characters.
- Black and white bars that we see on most books and consumer goods. They can be read by a Bar Code Reader or Light pen.
Down
- A wireless local network that uses radio waves to connect to the Internet.
- A measurement of how much data can be sent along a communication channel at the same time.
- Anyone who uses the computer.
- A group of computers that are linked together so they can communicate with one another.
- A monitor screen that can detect and respond to something, such as a finger or stylus, pressing on it.
- A device that shows the output from a system in picture form; output is short –lived, unlike that from a printer
- A types of non-impact printer that uses laser.
- Device used to produced hard copy output from a computer, usually on paper.
- Software designed to allow the input of text to a computer.
- A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
- A device that Resembles typewriter keyboard: is the most common unit for entering data and for coding or using program instructions.
- A code know only by the user that allows the computer to be sure of the identity of the person who is accessing information.
- The smallest part of a computer graphic image; the pixel is so small that it cannot be seen.
- One of the earliest known calculating devices on which rows of beads on wires are used to perform mathematical operations.
- Act of starting a computer by loading part of the operating system.
30 Clues: Approximately 1 billion byte. • Anyone who uses the computer. • Output on paper from computer. • The rules guiding the use of a command. • A set of instruction for processing data. • A types of non-impact printer that uses laser. • Software designed to allow the input of text to a computer. • Means Binary digits. Is the smallest unit of a computer memory. • ...
Information Technology (level 2) 2020-05-28
Across
- ... computer is the transmission of data in continuous wave form.
- What do an IT professional do? They are the people who test, build, install, repair, or maintain the hardware and ...
- ... computer is the transmission of data using distinct on and off electrical states.
- Electronic devices that can follow instructions to accept input, process that input and produce information.
- Set of instructions that directs the hardware to accomplish a task.
Down
- Physical component of the computer such as mouse and monitor.
- ... system is the most important software that runs on a computer such as Windows and Linux
- input, processing, output and storage are the ... of computer functions.
- ...software is a program or group of programs designed for end users such as Powerpoint and Word.
- ... and supercomputer is the types of computer.
10 Clues: ... and supercomputer is the types of computer. • Physical component of the computer such as mouse and monitor. • ... computer is the transmission of data in continuous wave form. • Set of instructions that directs the hardware to accomplish a task. • input, processing, output and storage are the ... of computer functions. • ...
COMPUTER TERMS 2015-09-15
Across
- A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
- A group of computers that are linked together so they can communicate with one another.
- The smallest part of a computer graphic image; the pixel is so small that it cannot be seen.
- A types of non-impact printer that uses laser.
- The set devices of the computer system that can be physically seen.
- A pictorial symbol on computer screen that represents a choice of activity.
- Software designed to allow the input of text to a computer.
- A measurement of the clarity of an image based on the number of pixel used to create the image.
- A device that shows the output from a system in picture form; output is short –lived, unlike that from a printer
- Act of starting a computer by loading part of the operating system.
- Means Binary digits. Is the smallest unit of a computer memory.
- A manual device connected as to a video game, with a control lever that can be tilted in various directions to move the cursor or part of the display.
- A set of instruction for processing data.
- A device that; allows an image that already exists to be input to the computer so that it can be manipulated using special software.
Down
- Anyone who uses the computer.
- A monitor screen that can detect and respond to something, such as a finger or stylus, pressing on it.
- A device that Resembles typewriter keyboard: is the most common unit for entering data and for coding or using program instructions.
- A measurement of how much data can be sent along a communication channel at the same time.
- A code know only by the user that allows the computer to be sure of the identity of the person who is accessing information.
- A wireless local network that uses radio waves to connect to the Internet.
- A dedicate device that incorporates all the parts of a processor on a single chip.
- Approximately 1 billion byte.
- Black and white bars that we see on most books and consumer goods. They can be read by a Bar Code Reader or Light pen.
- disk A microcomputer storage device that can typically store between 10 and 100 or more million characters.
- Output on paper from computer.
- A computer professional who writes programs, or sets of instruction for each application, debugs, and then documents them.
- A collection of web pages, normally on a single theme, on the Internet.
- Device used to produced hard copy output from a computer, usually on paper.
- The rules guiding the use of a command.
- One of the earliest known calculating devices on which rows of beads on wires are used to perform mathematical operations.
30 Clues: Anyone who uses the computer. • Approximately 1 billion byte. • Output on paper from computer. • The rules guiding the use of a command. • A set of instruction for processing data. • A types of non-impact printer that uses laser. • Software designed to allow the input of text to a computer. • Means Binary digits. Is the smallest unit of a computer memory. • ...
Chapter - 5: THE SYSTEM UNIT 2017-03-06
Across
- Five are common.
- Add this later.
- Eight or needed.
- Maintains the Network.
- Away to the network.
- Works while the enduser sleeps.
- Works with memory and eletronic signals
- Memory combo.
- A number of these.
- Can be found on the system board.
- Supplies information to ram when needed
Down
- Checks the computer at start-up.
- A sequence of bits.
- Has one part that is always comparing.
- Comes in unique types.
- Operates in two ways.
- Has controll of communication
- Works fast to supply information.
- Enhances fun in a virtual environment.
- One of three.
20 Clues: Memory combo. • One of three. • Add this later. • Five are common. • Eight or needed. • A number of these. • A sequence of bits. • Away to the network. • Operates in two ways. • Comes in unique types. • Maintains the Network. • Has controll of communication • Works while the enduser sleeps. • Checks the computer at start-up. • Works fast to supply information. • ...
TRICKY PUZZEL 2025-06-13
Across
- Topology which uses a single communication line or one main cable to which all the nodes are directly connected is known as
- Used to physically attach a computer to a network communication
- --------- is a device that connects two different types of networks with each other
- Duplication of data at multiple places is known as
- ------- is a computer network that is mainly created for an individual person
- Network that connects two or more computers located at distant places is known as
- When multiple mismatched copies of a file are stored o different computers ,it is called
- ------- enables you to connect your computer to the available internet connection over the existing telephone lines
- Each computer in a network is called a
- ------ is a larger network than LAN and is spread across the city. Since it covers a entire city, it is called metropolitan
Down
- -------- is a network device that is used to connect all the computers in a network with each other
- Layout in which the various components of a network , like nodes, links, peripherals ,etc. are connected and communicate with each other is known as
- Computer network that allows controlled access to an information source available on the internet
- Topology in which each device is connected to a central computer using a point-to-point connection
- Means of communication that uses low powered radio waves to transmit the data between devices is known as
- Computer network restricted to an organisation
16 Clues: Each computer in a network is called a • Computer network restricted to an organisation • Duplication of data at multiple places is known as • Used to physically attach a computer to a network communication • ------- is a computer network that is mainly created for an individual person • ...
Chapter - 5: THE SYSTEM UNIT 2017-03-06
Across
- A number of these.
- Enhances fun in a virtual environment.
- Memory combo.
- Checks the computer at start-up.
- Works with memory and eletronic signals
- Can be found on the system board.
- Works while the enduser sleeps.
- A sequence of bits.
- Away to the network.
- Supplies information to ram when needed
- Comes in unique types.
Down
- Maintains the Network.
- Works fast to supply information.
- Add this later.
- Has controll of communication
- Has one part that is always comparing.
- Five are common.
- One of three.
- Operates in two ways.
- Eight or needed.
20 Clues: Memory combo. • One of three. • Add this later. • Five are common. • Eight or needed. • A number of these. • A sequence of bits. • Away to the network. • Operates in two ways. • Maintains the Network. • Comes in unique types. • Has controll of communication • Works while the enduser sleeps. • Checks the computer at start-up. • Works fast to supply information. • ...
jobINjob 2013-09-10
Across
- older or elders
- partner, friend
- thought about, evaluated
- The only thing life gives you
- a person traveling on a mission
- thief, robber
- sanitation employee
- groups of people organizing or supporting a cause
- The way Mr. White teaches
- pastor, preacher
- head of a committee or department
- companions
Down
- meanings of words can be found here
- A gunfight is a dangerous one
- statement made to clarify
- people who resist traditions or laws
- Mr. White's football throws
- schedules appointments, types, organizes
- electronic machine, changed the world
- the crowd, group of people observing
20 Clues: companions • thief, robber • older or elders • partner, friend • pastor, preacher • sanitation employee • thought about, evaluated • statement made to clarify • The way Mr. White teaches • Mr. White's football throws • A gunfight is a dangerous one • The only thing life gives you • a person traveling on a mission • head of a committee or department • meanings of words can be found here • ...
chapter 5 Unit 5 2023-05-15
Across
- set of coordinated networkof components
- internal network accessible only by authorized personnel
- handling information,especially facts.
- the process of transferringdata between storge types,formats,or computer system.
Down
- computerized storge for information and facts
- programs that instruct computers to perform specific operations
- the physical components of a computer system
- mechanisms used by websites to track users'browsing history
- storge online storge
- facts and figures
10 Clues: facts and figures • storge online storge • handling information,especially facts. • set of coordinated networkof components • the physical components of a computer system • computerized storge for information and facts • internal network accessible only by authorized personnel • mechanisms used by websites to track users'browsing history • ...
Computer hardware 2025-09-18
Across
- The brain that performs calculations
- Stores data without moving any mechanical parts
- Provides services to other devices
- A network that contains different types of network that connects locally and globally p_Address
- The physical parts of a computer
- Stores the operating system, applications, and user files
Down
- The software that manages a computer's hardware and software resources
- Anything that connects to a computer externally
- A set of numbers assigned to every device connected to the internet
- Connects peripheral devices to computers
- Connects all parts together
- A network of physical objects with sensors, software, and more
- Temporarily stores data being used
13 Clues: Connects all parts together • The physical parts of a computer • Provides services to other devices • Temporarily stores data being used • The brain that performs calculations • Connects peripheral devices to computers • Anything that connects to a computer externally • Stores data without moving any mechanical parts • ...
Elizabeth - Anatomy of A Computer 2022-02-09
Across
- Performs system checks before starting your main operating system
- Most newer computers and mice require these types of ports
- Carries out your computers instructions
- Carries image to your monitor
- USB and FireWire connections are quickly replacing...
- data to and from the appropriate devices
Down
- Port that transfers data from one location to another
- This contains most computer components and
- Also known as a communications port
- If your motherboard does not have a sound chip, you buy a ...
- Used to connect many different types of peripherals
- Funnels power through multicoloured cables
- Lets peripherals communicate quickly with the processor
- Where the CPU stores temporary information
14 Clues: Carries image to your monitor • Also known as a communications port • Carries out your computers instructions • data to and from the appropriate devices • This contains most computer components and • Funnels power through multicoloured cables • Where the CPU stores temporary information • Used to connect many different types of peripherals • ...
Networking Concepts and Cyber Ethics 2025-06-04
Across
- A network device that is used to connect all the computers in a network with each other
- Refers to criminal activities that involve the use of computers,networks etc
- A program or set of programs that disrupts the normal functioning of the computer
- A process of transforming data into unreadable code
- Refers to an illegal intrusion into a computer system or network
- Refers to unwanted bulk emails that come from unknown sources
- Two or more computers and peripheral devices are connected within a small area,such as room etc
- Refers to a computer network that allows controlled access to an information source available on the internet
Down
- A legal right granted by the law to the creator for his original work
- A process that converts the encrypted information into a readable form
- A wireless technology used to interconnect mobile phones,computers etc using short range wireless connection
- A device that connects two different types of networks with each other
- A security system that prevents unauthorised people from accessing your system or network
- A computer network that is mainly created for an individual person
- A kind of network connects two or more computers located at distant places
- Refers to a computer network restricted to an organisation
16 Clues: A process of transforming data into unreadable code • Refers to a computer network restricted to an organisation • Refers to unwanted bulk emails that come from unknown sources • Refers to an illegal intrusion into a computer system or network • A computer network that is mainly created for an individual person • ...
Theory Exam Puzzle 2025-11-05
Across
- The smallest chunk of memory, can only store one piece of data or one memory address
- Gives all English characters a number up to 255.
- Piece of quartz that sends signals to the CPU
- Made up of 1s and 0s.
- Two types of registers, data and ____.
- Performs math related tasks for the computer.
- GHz mean ____ of cycles per second
Down
- The green thing that everything is connected to.
- Memory that has average speed, capacity and price.
- Abbreviation of Random Access Memory.
- HDD is the type of hard drive with spinning ___
- Fetches instructions and tells the CPU what to do
- Memory component with fastest access speed.
- Zero One One Zero equals ____.
- The name of the wiring that connects parts of the computer
15 Clues: Made up of 1s and 0s. • Zero One One Zero equals ____. • GHz mean ____ of cycles per second • Abbreviation of Random Access Memory. • Two types of registers, data and ____. • Memory component with fastest access speed. • Piece of quartz that sends signals to the CPU • Performs math related tasks for the computer. • HDD is the type of hard drive with spinning ___ • ...
Malware-Q 2018-01-16
Across
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- What the second "D" in "DDoS" stands for.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- Someone who knows a lot about computers and loves to fool around with them.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- Term for a computer added to a botnet.
- Not dangerous. Possibly beneficial.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-S 2018-01-16
Across
- Term for a computer added to a botnet.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- Someone who knows a lot about computers and loves to fool around with them.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- What the second "D" in "DDoS" stands for.
Down
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- Not dangerous. Possibly beneficial.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- A program that prevents, detects, and removes viruses or other malware from a computer system.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-T 2018-01-16
Across
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- Not dangerous. Possibly beneficial.
- What the second "D" in "DDoS" stands for.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- Someone who knows a lot about computers and loves to fool around with them.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
Down
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- Term for a computer added to a botnet.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-F 2018-01-16
Across
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- Not dangerous. Possibly beneficial.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- Someone who knows a lot about computers and loves to fool around with them.
Down
- What the second "D" in "DDoS" stands for.
- Term for a computer added to a botnet.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-L 2018-01-16
Across
- Someone who knows a lot about computers and loves to fool around with them.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- Term for a computer added to a botnet.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- Not dangerous. Possibly beneficial.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- What the second "D" in "DDoS" stands for.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-M 2018-01-16
Across
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- What the second "D" in "DDoS" stands for.
Down
- Someone who knows a lot about computers and loves to fool around with them.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- Term for a computer added to a botnet.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- Not dangerous. Possibly beneficial.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-R 2018-01-16
Across
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- What the second "D" in "DDoS" stands for.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
Down
- Someone who knows a lot about computers and loves to fool around with them.
- Term for a computer added to a botnet.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- Not dangerous. Possibly beneficial.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-C 2018-01-16
Across
- Term for a computer added to a botnet.
- Not dangerous. Possibly beneficial.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- What the second "D" in "DDoS" stands for.
- Someone who knows a lot about computers and loves to fool around with them.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
Down
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-D 2018-01-16
Across
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- What the second "D" in "DDoS" stands for.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
Down
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- Someone who knows a lot about computers and loves to fool around with them.
- Not dangerous. Possibly beneficial.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- Term for a computer added to a botnet.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-E 2018-01-16
Across
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- What the second "D" in "DDoS" stands for.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- Someone who knows a lot about computers and loves to fool around with them.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- Term for a computer added to a botnet.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
Down
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- Not dangerous. Possibly beneficial.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-H 2018-01-16
Across
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- Someone who knows a lot about computers and loves to fool around with them.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- Not dangerous. Possibly beneficial.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- What the second "D" in "DDoS" stands for.
- Term for a computer added to a botnet.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Crossword Puzzle: Cyber Ethics & Networking Concepts 2025-05-23
Across
- Each computer in a network.
- Wireless technology used to interconnect mobile phones, computers and printers using short-range wireless connection.
- Criminal practice of using social influence over the telephone system to gain access to sensitive information.
- Malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
- Being aware of the ethical practices, and behaving responsibly and appropriately while using the internet.
- Illegal intrusion into a computer system or network.
- Device that connects two different types of networks with each other.
- Enables to connect the computer to the available internet connection over the existing telephone lines.
Down
- Purchasing a single licensed copy of the software and loading it on several computers contrary to the licenses terms.
- Certain sets or rules determining how data should be transferred, compressed, and so on.
- Computer network allowing controlled access to an information source.
- Computer network restricted to an organization.
- Unwanted bulk emails coming from unknown sources.
- Criminal activities involving computers, internet connections, networks with intent to cause harm.
- Network device used to connect all the computers in a network with each other.
15 Clues: Each computer in a network. • Computer network restricted to an organization. • Unwanted bulk emails coming from unknown sources. • Illegal intrusion into a computer system or network. • Computer network allowing controlled access to an information source. • Device that connects two different types of networks with each other. • ...
Malware-I 2018-01-16
Across
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
Down
- Not dangerous. Possibly beneficial.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- Term for a computer added to a botnet.
- Someone who knows a lot about computers and loves to fool around with them.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- What the second "D" in "DDoS" stands for.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-L 2018-01-16
Across
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- Term for a computer added to a botnet.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- Someone who knows a lot about computers and loves to fool around with them.
Down
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- Not dangerous. Possibly beneficial.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- What the second "D" in "DDoS" stands for.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-K 2018-01-16
Across
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- Term for a computer added to a botnet.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- Not dangerous. Possibly beneficial.
- Someone who knows a lot about computers and loves to fool around with them.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
Down
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- What the second "D" in "DDoS" stands for.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-P 2018-01-16
Across
- Someone who knows a lot about computers and loves to fool around with them.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
Down
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- Term for a computer added to a botnet.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- Not dangerous. Possibly beneficial.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- What the second "D" in "DDoS" stands for.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-J 2018-01-16
Across
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- Term for a computer added to a botnet.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
Down
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- What the second "D" in "DDoS" stands for.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- Someone who knows a lot about computers and loves to fool around with them.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- Not dangerous. Possibly beneficial.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Parts of a computer Maha 2017-06-30
Across
- An electronic device for storing and processing information
- A device that is used for a fast way of connecting devices to a computer that provides fast access (9,6,3)
- It is an input device which records sounds
- Permanent storage that is used to start up your computer
- A computer that controls access to a network
- A device that records and stores digital images (7,6)
- A device that uses light to convert a paper based document into a digital format
Down
- Is an electronic device that controls another device
- They are particularly easy to use for those with limited movement in their hands and are an alternative for a mouse (7,4,5)
- used to be popular with gamers but have slowly been replaced by other types of game controller
- The physical parts of a computer system
- The main circuit board of your computer that everything else plugs into
- You control it with your hand where you want it to go and when it moves the cursor moves inside the mouse to then click on what you want it to
13 Clues: The physical parts of a computer system • It is an input device which records sounds • A computer that controls access to a network • Is an electronic device that controls another device • A device that records and stores digital images (7,6) • Permanent storage that is used to start up your computer • An electronic device for storing and processing information • ...
Malware-A 2018-01-16
Across
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- Not dangerous. Possibly beneficial.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
Down
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- Someone who knows a lot about computers and loves to fool around with them.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- Term for a computer added to a botnet.
- What the second "D" in "DDoS" stands for.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-B 2018-01-16
Across
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- Not dangerous. Possibly beneficial.
- Term for a computer added to a botnet.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
Down
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- Someone who knows a lot about computers and loves to fool around with them.
- What the second "D" in "DDoS" stands for.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-G 2018-01-16
Across
- Not dangerous. Possibly beneficial.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
Down
- What the second "D" in "DDoS" stands for.
- Someone who knows a lot about computers and loves to fool around with them.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- Term for a computer added to a botnet.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Malware-O 2018-01-16
Across
- A type of malware that displays unwanted ads on the screens of unfortunate users, typically in pop-ups or "uncloseable" windows.
- Term for adware that snoops on a computer user's activities without their consent, then reports back to the author about what the user does.
- This type of computer virus uses unreported errors or bugs in the operating systems of devices on a network, to spread across the network, no user action necessary.
- A ____ ___ exploit is a vulnerability or security hole in a computer program that is completely unknown to the unsuspecting user(s).
- A set of commands required to do specific things with a program, stored in an abbreviated form for automatic execution.
- An _________ is a file sent along with an email message. Computer viruses are notoriously transmitted inside executable file attachments.
- What the second "D" in "DDoS" stands for.
- In computers, a _____ is a small piece of malware that copy itself onto other programs or data files when it is executed.
- Malware that encrypts a victim's files to prevent access, then demands payment to decrypt them.
- Malicious program that secretly records every keystroke typed by a computer’s owner.
Down
- Term for a computer added to a botnet.
- A type of malware that hides on a machine after installation, giving distant attackers unauthorized access to the machine by secret "back door", allowing the machine to be attached to a botnet, and permitting the theft of personal information.
- Someone who knows a lot about computers and loves to fool around with them.
- The place on a persistent memory device that holds machine code to be loaded and run when a computer starts up.
- The use of computers or computer networks to promote a political or social agenda such as free speech, human rights, or freedom of information.
- An __________ file contains program code for a microprocessor, rather than data for a human user to interpret and appreciate (text, images, music).
- A group of devices infected by malware given command and control to someone located elsewhere on the net.
- A program that prevents, detects, and removes viruses or other malware from a computer system.
- An umbrella term used for various types of harmful or intrusive software--computer viruses, worms, Trojan horses, ransomware, spyware, adware, scamware.
- Not dangerous. Possibly beneficial.
20 Clues: Not dangerous. Possibly beneficial. • Term for a computer added to a botnet. • What the second "D" in "DDoS" stands for. • Someone who knows a lot about computers and loves to fool around with them. • Malicious program that secretly records every keystroke typed by a computer’s owner. • ...
Computers 2024-01-11
Across
- sometimes referred to as the display, is the part of the computer that displays output for users to view, like graphics and text.
- includes all of the physical parts that make up a computer such as the monitor and the central processing unit, that keeps data moving
- is an important device used to interact with items displayed on the screen. When you move it, a pointer on the screen also moves, allowing you to operate the computer.
- is an input device used to interact with a computer. You can type letters, numbers, and characters that will be processed by the computer.
- is a common type of portable personal computing device, that is small enough to be handheld. The primary use is to make phone calls using mobile networks.
Down
- is an electronic machine that can process, store, and retrieve different types of data and information.
- the intangible parts of a computer, the parts that can't be touched.
- allow you to listen to sound that comes from the computer.
- holds the brains of the computer, the physical parts that process information and make the computer function.
- is a portable personal computer, where all parts of the computer are contained in one device.
- is another type of portable personal computer. Are often used for entertainment activities like watching movies or playing games.
11 Clues: allow you to listen to sound that comes from the computer. • the intangible parts of a computer, the parts that can't be touched. • is a portable personal computer, where all parts of the computer are contained in one device. • is an electronic machine that can process, store, and retrieve different types of data and information. • ...
Anatomy Crossword (no abbreviations) 2017-02-10
Across
- temporary information, such as data relating to open programs, is stored here
- covered by a heatsink, and the "brain" of the computer
- MP3's, modern printers, and personal digital assistants require these connections
- these slots let peripherals communicate quickly with the processor
- a very outdated port, most of the time it is unused
- use these to connect many different types of peripherals
- if your computer does not come with one, you can buy one and attach it to a PCI slot
Down
- houses the computer's graphics card, and often include additional RAM
- activates when you turn on the computer and performs system checks before starting the computer's main OS
- most mice and keyboards require these ports
- for older printers and scanners, you would need to plug them into this
- houses most of the components in a computer
- funnels power through multicolored cables
13 Clues: funnels power through multicolored cables • most mice and keyboards require these ports • houses most of the components in a computer • a very outdated port, most of the time it is unused • covered by a heatsink, and the "brain" of the computer • use these to connect many different types of peripherals • ...
Adaeze C. 2014-11-13
Across
- computer or device on network that holds and manages network resources and answers to requests for information. Other types are file and print.
- stands for wireless fidelity; type of broadband internet connection that works with radio signals to give high speed internet connections
- world wide connection of networks that connect many businesses, government agencies, educational institutions, and individual
- stands for Uniform Resource Locator; an address for documents on Web.
- quality of a picture or the screen on a computer.
- made of 8 bits also is a unit of memory on a computer chip that can hold the equivalent of one character.
- when being connected to the Internet.
Down
- something that is for usage by a end user.
- things on a computer that you can see and feel (examples: keyboard, monitor, and printer)
- stands for hyper-text markup language; file format for documents seen using browser network. Language of web.
- page- main page of Web site.
- box- box that shows up on display screen and asks for input or gives you information.
- stands for internet etiquette; code of acceptable behaviors one should abide while on internet
- places on computer you can't touch - set of instructions that gives computer directions on what to do
- part of filename that usually tells the program in which the file was made and will use to open.
15 Clues: page- main page of Web site. • when being connected to the Internet. • something that is for usage by a end user. • quality of a picture or the screen on a computer. • stands for Uniform Resource Locator; an address for documents on Web. • box- box that shows up on display screen and asks for input or gives you information. • ...
Adaeze C. 2014-11-13
Across
- computer or device on network that holds and manages network resources and answers to requests for information. Other types are file and print.
- stands for wireless fidelity; type of broadband internet connection that works with radio signals to give high speed internet connections
- world wide connection of networks that connect many businesses, government agencies, educational institutions, and individual
- stands for Uniform Resource Locator; an address for documents on Web.
- quality of a picture or the screen on a computer.
- made of 8 bits also is a unit of memory on a computer chip that can hold the equivalent of one character.
- when being connected to the Internet.
Down
- something that is for usage by a end user.
- things on a computer that you can see and feel (examples: keyboard, monitor, and printer)
- stands for hyper-text markup language; file format for documents seen using browser network. Language of web.
- page- main page of Web site.
- box- box that shows up on display screen and asks for input or gives you information.
- stands for internet etiquette; code of acceptable behaviors one should abide while on internet
- places on computer you can't touch - set of instructions that gives computer directions on what to do
- part of filename that usually tells the program in which the file was made and will use to open.
15 Clues: page- main page of Web site. • when being connected to the Internet. • something that is for usage by a end user. • quality of a picture or the screen on a computer. • stands for Uniform Resource Locator; an address for documents on Web. • box- box that shows up on display screen and asks for input or gives you information. • ...
anatomy of a computer 2021-02-08
Across
- ports that transfer data and are used to connect many different types of input/output devices
- houses your graphics card and supplies the images to your monitor
- the brain of the computer
- a computer's built-in sound chip
- a port for older printers or scanners
- houses most of your computer's components and manages data traffic
Down
- a computer's built-in operating system which performs a basic check on start-up before booting up your main OS
- a port for older keyboards, mice, and modems
- slots that let input/output devices communicate with the processor quickly when placed in one of those slots.
- a port that connects devices to a computer and allows them to draw power from the computer
- a storage unit which holds temporary information and sends that info to your hard drive when it reaches max capacity
- gives power to the computer through wires
- ports dedicated for mice and keyboards.
13 Clues: the brain of the computer • a computer's built-in sound chip • a port for older printers or scanners • ports dedicated for mice and keyboards. • gives power to the computer through wires • a port for older keyboards, mice, and modems • houses your graphics card and supplies the images to your monitor • houses most of your computer's components and manages data traffic • ...
Lesson 26 crossword 2015-04-23
Across
- types of personal informational scams
- something intended to deceive; deliberate trickery intended to gain an advantage
- an attempt to deceive an audience into believing that something false is real
- a technique that examines fingerprint, voice pattern, or this iris of the eye
- computer virus triggered by the (dis)appearance of specified data
- virus that makes many copies of itself, which slows down the computer
Down
- the practice of adding keywords to content to simplify searching
- profits are based on the investor's ability to recruit people who are enrolled to make payments
- a format originally developed to facilitate the syndication of news articles
- good manners and proper behaviors when communicating through electronic mail
- telecommunications service in which parties can participate via phone in a group meeting
- a process that can be used to cut down on or eliminate most junk mail
- computer virus that does not cause its damage until a certain date or until the system is booted
- a computer program that is written to cause corruption of data
- computer virus that does something different from what it is expected to do
- a story which once could have been true, but has grown from constant retelling into a mythical yarn
- unsolicited commercial e-mail that is sent to many people at the same time to promote products
17 Clues: types of personal informational scams • a computer program that is written to cause corruption of data • the practice of adding keywords to content to simplify searching • computer virus triggered by the (dis)appearance of specified data • a process that can be used to cut down on or eliminate most junk mail • ...
Computer Crossword Puzzle 2020-09-30
Across
- handheld computers, and similar technology
- an electronic device for the visual presentation of data.
- designed to block unauthorized access while permitting outward communication.
- the retention of retrievable data on a computer or other electronic system
- type of graphical user interface
- different types of data storage
- an electronic device for storing and processing data
- a set of things working together as parts of a mechanism
Down
- an electrical impulse or radio wave transmitted or received.
- a continuous area or expanse which is free, available, or unoccupied.
- values of a physical quantity such as voltage
- the smallest operable units of storage
- facts and statistics collected together for reference or analysis
- the application of scientific knowledge for practical purposes
- component used to store data
15 Clues: component used to store data • different types of data storage • type of graphical user interface • the smallest operable units of storage • handheld computers, and similar technology • values of a physical quantity such as voltage • an electronic device for storing and processing data • a set of things working together as parts of a mechanism • ...
3.1 Malware Vocabulary Practice 2021-10-20
Across
- prevents a user's endpoint device from properly and fully functioning until a fee is paid
- tracking software that is deployed without the consent or control of the user
- computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
- malware that can hide its presence and the presence of other malware on the computer
- a malicious program that uses a computer network to replicate
Down
- type of malware that imprisons users and encrypts all files on the device so that none of them can be opened
- does not attach itself to a file
- gives access to a computer, program, or service that circumvents any normal security protections
- silently captures and stores each keystroke that a user types on the computer's keyboard
- software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action
- Infected robot computer
- an executable program that masquerades as performing a benign activity but also does something malicious
12 Clues: Infected robot computer • does not attach itself to a file • a malicious program that uses a computer network to replicate • tracking software that is deployed without the consent or control of the user • malware that can hide its presence and the presence of other malware on the computer • ...
IT Media Content Area 3 - L7-12 2025-04-11
Across
- An actual disk on which the data is stored, this is then read by a mechanical arm.
- A kind of audio recording that sends two different signals to separate channels when played back
- he place where computers store their data, this is typically done using either a Hard Disk Drive (HDD) or a Solid State Drive (SSD).
- USB and SD card where there are no moving parts.
- Designed to store audio data for use with/on Apple technologies and applications.
- designed to remove the graphical processing tasks from the processor
- Often referred to as the brain of the computer.
- Primary memory that stores data - including those programs and processes that are frequently accessed.
- A set of instructions that a computer can run
- Can contain various types of audio content, from audiobooks, to songs, to podcasts.
Down
- A core circuit board through which all components of a computer communicate
- Type of compression where the image/audio can not be rebuilt to the original file.
- Type of compression where the image/audio can be rebuilt to the original file
- A computer programme that allows the user to perform an activity or complete a task.
- Allows the computer to process and deliver sound.
- Used in recording this is a larger audio file size (uncompressed).
- A type of audio recording that sends a single signal when played back, creating a single-level experience of the sound.
- One of the most distributed audio files used today.
- One of the most distributed video files.
19 Clues: One of the most distributed video files. • A set of instructions that a computer can run • Often referred to as the brain of the computer. • USB and SD card where there are no moving parts. • Allows the computer to process and deliver sound. • One of the most distributed audio files used today. • Used in recording this is a larger audio file size (uncompressed). • ...
Anotomy of a Computer 2020-12-03
Across
- random access memory
- port communications port
- port Type of port for older printer and scanners
- power supply unit
- Basic input/output system
- universal serial bus
Down
- printed circuit board
- connect many different types of peripherals
- Type of port for older mouse and keyboard
- brain of the computer
- accelerated graphics port
- peripheral component interconnect
- card produces sound
13 Clues: power supply unit • card produces sound • random access memory • universal serial bus • printed circuit board • brain of the computer • port communications port • accelerated graphics port • Basic input/output system • peripheral component interconnect • Type of port for older mouse and keyboard • connect many different types of peripherals • ...
Hardware & Software 2022-11-04
Across
- hardware that allows you to put input information into a computer.
- these types of controls involve application security and control.
- handled by cloud service providers, include physical and environmental controls, such as security of equipment and maintaining a safe and secure environment.
- shared by both the user and cloud service providers, include patch management, configuration management and awareness and training.
- peripherals computer hardware components that are located outside a computer.
Down
- hardware that allows you to send information from a computer.
- computer hardware components that are located within a computer.
- computer programs and related data that provide the instructions for telling the computer hardware how to do it.
- physical components that make up a computer system.
9 Clues: physical components that make up a computer system. • hardware that allows you to send information from a computer. • computer hardware components that are located within a computer. • these types of controls involve application security and control. • hardware that allows you to put input information into a computer. • ...
Types and Components of Computer Systems 2022-10-12
Across
- Device displays the result of the processing of data.
- An input device you can use to type something in.
- It's a touchable part of the computer.
- Basic input output system.
- Is used to perform some operations and applications.
- Easily stolen, easily broken, difficult to control the touchpad.
- The instruction, programs, and applications running on the computer.
- Any hardware device that sends data to a computer.
Down
- It's the RAM & ROM.
- GAME
- Easier to communicate through calls, text, and internet and addictive.
- Used to save data, programs, and output.
- Easier to repair and upgrade, but heavy and consumes much space.
- It cannot be removed, edited, or changed.
- Holds the data the user is currently using.
15 Clues: GAME • It's the RAM & ROM. • Basic input output system. • It's a touchable part of the computer. • Used to save data, programs, and output. • It cannot be removed, edited, or changed. • Holds the data the user is currently using. • An input device you can use to type something in. • Any hardware device that sends data to a computer. • ...
Computer History and Types of Computers 2024-01-16
Across
- Douglas Engelbart invented this device
- type of PC small and portable
- type of computer which supports thousands of users
- Christopher Latham Sholes invented this evice
- a network which led to the birth of the Internet
- type of PC small enough to hold in your hand
- An electronic device that receives data, processes data, produces a result, and stores data.
- WWW
- type of personal computer fits on a desk
Down
- fastest type of computer
- He is credited with being the "Father of the Computer"
- What is another name for integrated circuit
- First electronic programmable computer.
- First personal computer
- type of PC where the operating system is supported by Google
15 Clues: WWW • First personal computer • fastest type of computer • type of PC small and portable • Douglas Engelbart invented this device • First electronic programmable computer. • type of personal computer fits on a desk • What is another name for integrated circuit • type of PC small enough to hold in your hand • Christopher Latham Sholes invented this evice • ...
St10155076.Bcad group 4.Ice 2 2022-08-19
Across
- : a computer hardware device that converts data from a digital format into a format suitable for an analog transmission
- layer : in charge of the delivery of packets from a source A to a destination B
- : virtual point where network connections start and end
- : a computer or device that links two similar LANs based on the same protocol.
- layer : in charge of the management of network access.
- : Define the rules that govern the communications between two computers connected to the network.
- layer : ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc.
- : allows the constitution of communication groups (newsgroups) organized around specific topics
- : a specialized computer that makes it convenient to manage a bank account holder's funds.
- : a network device that connects two different systems, using direct and systematic translation between protocols.
Down
- : the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
- : allows the transfer of collection of files between two machines connected to the Internet.
- Model : Consists of only 4 layers: application, transport, internet and network.
- : a communication computer that connects different types of networks using different protocols.
- : Involves 7 layers, each playing a specific role when applications are communicating over the net.
- : a computer network in which the computers connected may be far apart, generally having a radius of more than 1 km.
- : allows the management of the network.
- : allows a user to connect to a remote host in terminal mode.
- : a collection of devices connected together in one physical location, such as a building, office, or home
- : defines a basic service for electronic mails.
20 Clues: : allows the management of the network. • : defines a basic service for electronic mails. • layer : in charge of the management of network access. • : virtual point where network connections start and end • : allows a user to connect to a remote host in terminal mode. • layer : in charge of the delivery of packets from a source A to a destination B • ...
Types of Hardware and Computer Applications 2024-06-08
Across
- Weakness of computer (dumb machines)
- Physical part of computer
- Referred as texting
- Mid range servers
- Binary digit
- Volatile
- Input device
- Optical media
- Fast memory but limited size
Down
- Type of removable memories
- Strength of computers (immune)
- Electronic mail
- Flash Memories
- Unprocessed raw facts
- Combination of messaging and blogging
15 Clues: Volatile • Binary digit • Input device • Optical media • Flash Memories • Electronic mail • Mid range servers • Referred as texting • Unprocessed raw facts • Physical part of computer • Type of removable memories • Fast memory but limited size • Strength of computers (immune) • Weakness of computer (dumb machines) • Combination of messaging and blogging
Revision Crossword 2016-05-12
Across
- opposite to straight hair
- a large area of fresh water
- interesting places in the city
- a thing you wear while riding a bike
- very tall building in the city
- a place where you buy cakes, pies and bread.
- everything you can see when you look across a large area of land
- solar panels save it
- a person who always tells the truth
- very old
- cuts peoples' hair
- people wear colourful costumes and masks there
Down
- you see them at an amusement park
- glasses that are used while swimming
- a film when you feel scary
- give a new life to appliances
- a city with people of different types and from fifferent countries
- you listen to music on your mobile phone or computer with the help of it
- types letters and answers the phone
- a place where you can buy medicine
- a mountain with a hole at the top caused by an eruption
- a piece of land surrounded by water
22 Clues: very old • cuts peoples' hair • solar panels save it • opposite to straight hair • a film when you feel scary • a large area of fresh water • give a new life to appliances • interesting places in the city • very tall building in the city • you see them at an amusement park • a place where you can buy medicine • types letters and answers the phone • a person who always tells the truth • ...
ADSI Kevin Lopez Morales 2022-05-05
Across
- engages in one or more aspects of the software development process.
- is a type of methodology used to describe the process for building information systems, aimed at developing information systems in a very deliberate, structured and methodical way, iterating each stage of the life cycle.
- One of these is object-oriented programming.
- is a programmable digital electronic machine that executes a series of commands to process input data.
- It is a systems approach to the analysis and design of information systems.
- is a software life cycle model first defined by Barry Boehm in 1986.
- It is a scheme or framework that offers a base structure to develop a project with specific objectives.
- it is the set of knowledge and techniques that are applied in an orderly manner to achieve a specific objective or solve a problem.
- refers to a sequential procedure that allows a project to be represented based on phases that follow each other.
Down
- It is a system for storing and processing information.
- It is an organized collection of information or structured data, which is usually stored electronically in a computer system.
- is a software whose function is to perform mathematical operations from data arranged in the cells of the tables.
- use languages like java, js, python, html
- it is a block of code that performs some operation.
- It is one of the branches of computer science that studies the creation of reliable and quality software.
- it is a high-level perspective view of all deliverables, key milestones, and overall project goals.
- is a broad term for describing methodologies for developing high quality Information System which combines Information Technology.
- it is a portion of a computer program.
- is a computer program designed as a tool to allow a user to perform one or several types of tasks.
- text developed in a programming language and that must be compiled or interpreted in order to be executed on a computer
20 Clues: it is a portion of a computer program. • use languages like java, js, python, html • One of these is object-oriented programming. • it is a block of code that performs some operation. • It is a system for storing and processing information. • engages in one or more aspects of the software development process. • ...
Security and Networking 2024-07-24
Across
- Mining New patterns or relationships between data.
- A scam that threatens to delete or expose victims stolen data for money.
- provides multiple port for connecting nodes.
- Term for many types of malicious computer programs that is created to harm users and their computer systems.
- Some information sytems are called.
- A node on a network that serves as an entrance to another network.
- Is a type of computer that is able to continue when problems are present.
- Any step taken to ward off a threat.
- Allows sharing and communication between devices.
- A weakness that's not protected against threats.
Down
- system The complex system for acquiring, storing, organizing, using, and sharing data and information.
- Authentication Its two forms of identification, one being your password and entering a code sent directly to you.
- Information System Software tools that allows managers to gather, organize, and evaluate information.
- Is term for infected computers that under control of a hacker.
- warehouse Is an enormous digital warehouse that contains archived data gathered from multiple databases.
- Assessment Used to identify and examine possible threats.
- Anything that causes harm.
- The act of gaining someones trust by pretending you are someone else.
- Structures that data moves through networks.
- Is used to share company resources with individuals not in the organization.
- Designed to report activity on your computer to another party.
- The most widely used standard for local area networks.
22 Clues: Anything that causes harm. • Some information sytems are called. • Any step taken to ward off a threat. • provides multiple port for connecting nodes. • Structures that data moves through networks. • A weakness that's not protected against threats. • Allows sharing and communication between devices. • Mining New patterns or relationships between data. • ...
IT Security 1 2017-05-19
Across
- This involves the illegal copying of information from the magnetic strip of a credit card.
- is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
- A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
- is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
- consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
- is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
- is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
- is another type of malware that is activated each time a computer system boots (loads) up.
- involves gaining access to a computer or network with authorization from a company or organisation.
- is the processed output of data making it meaningful to the person who receives it.
- This involves gaining personal information through deception.
- involves gaining access to a computer or network without authorization.
- is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
- is the conversion of data into a form that cannot be easily understood by unauthorized people.
- also known as zombie is a group of computers connected together for malicious purposes.
- is a software application that automatically displays advertising banners while the program is running.
- This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
- occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
- is a secret way to access a computer without passing security mechanisms.
- is a program that secretly installs itself on computers and collects information about users without their knowledge.
- refers to any crime that involves a computer and a network.
- is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
- involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
- is raw unorganized facts that need to be processed.
- is malicious software designed to install itself on a computer without the owner’s knowledge.
- The practice of recovering sensitive information from discarded material.
- is a system designed to prevent unauthorized access to or from a private network (LAN).
- is sequences of instructions that make a computer program perform a specific task.
- it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
29 Clues: is raw unorganized facts that need to be processed. • refers to any crime that involves a computer and a network. • This involves gaining personal information through deception. • involves gaining access to a computer or network without authorization. • is a secret way to access a computer without passing security mechanisms. • ...
Final Exam Review 2022-05-19
Across
- A System of Many Parts That Work Together.
- Sorting feature...Z-A; Highest to lowest
- A list of steps to finish a task.
- The brains of the computer. Any time you click the mouse or press a key on the keyboard.
- A collection of worksheets.
- Lets you explore the Internet where you can find lots of information, like pictures, videos, and webpages. Examples of browsers are Google Chrome, Apple Safari, Microsoft Edge, and Mozilla Firefox.
- An algorithm that has been coded into something that can be run by a machine.
- Horizontal part of the worksheet identified by numbers
- Looks like a TV screen and lets you see your work and your files.
- Are the parts of a computer that you can actually touch are called.
- Sorting Feature, Alphabetical Order or Lowest to Highest
- Tells the hardware what to do and how to do it. For example, writing and reading programs, and games might be some types of software you have used before.
- Used to add a long column of numbers.
- Not giving up. Persistence works best when you try things many different ways, many different times.
Down
- Small square in the lower right corner of a selection.
- Putting commands in correct order so computers can read the commands.
- Protects your computer so that it doesn't get a computer virus.
- The intersection of a row and column.
- Vertical part of the worksheet identified by letters.
- The art of creating a program.
- Is used for typing words and numbers on the computer. Whatever you type on the keyboard, you can see on your monitor.
- Part of a program that does not work correctly.
- The words or titles used in spreadsheets.
- Lets you point to objects on your screen, click on them, and even move them. You can also use the mouse to scroll (or move) through different parts of your screen.
24 Clues: A collection of worksheets. • The art of creating a program. • A list of steps to finish a task. • The intersection of a row and column. • Used to add a long column of numbers. • Sorting feature...Z-A; Highest to lowest • The words or titles used in spreadsheets. • A System of Many Parts That Work Together. • Part of a program that does not work correctly. • ...
Computer Terms by Miranda Díaz 2016-09-14
Across
- a unit of information equal to 220 bytes or, loosely, one million bytes
- read-only memory
- the physical arrangement in a computer that contains the computers basic circuitry and components
- a collection of all the parts you can physically touch
- a flat screen, flat panel computer monitor or television
Down
- the smallest unit of data in a computer
- the many types of programs used to operate computers and related devices
- an opening on computer network equipment that ethernet cables plug into
- a type of Internet-based computing
- a wireless networking technology that allows computers and other devices to communicate over a wireless signal
10 Clues: read-only memory • a type of Internet-based computing • the smallest unit of data in a computer • a collection of all the parts you can physically touch • a flat screen, flat panel computer monitor or television • a unit of information equal to 220 bytes or, loosely, one million bytes • an opening on computer network equipment that ethernet cables plug into • ...
IT Security 1 2017-05-19
Across
- is a type of malware that self-replicates and distributes copies of itself in a computer network.
- refers to any crime that involves a computer and a network.
- occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
- is a program that secretly installs itself on computers and collects information about users without their knowledge.
- involves gaining access to a computer or network with authorization from a company or organisation.
- This involves the illegal copying of information from the magnetic strip of a credit card.
- is sequences of instructions that make a computer program perform a specific task.
- is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
- is another type of malware that is activated each time a computer system boots (loads) up.
- also known as zombie is a group of computers connected together for malicious purposes.
- it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
- is a software application that automatically displays advertising banners while the program is running.
- is malicious software designed to install itself on a computer without the owner’s knowledge.
- is a system designed to prevent unauthorized access to or from a private network (LAN).
- This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
- is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
- This involves gaining personal information through deception.
- is the conversion of data into a form that cannot be easily understood by unauthorized people.
Down
- consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
- involves gaining access to a computer or network without authorization.
- is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
- A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
- is raw unorganized facts that need to be processed.
- involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
- is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
- The practice of recovering sensitive information from discarded material.
- is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
- is a secret way to access a computer without passing security mechanisms.
- is the processed output of data making it meaningful to the person who receives it.
29 Clues: is raw unorganized facts that need to be processed. • refers to any crime that involves a computer and a network. • This involves gaining personal information through deception. • involves gaining access to a computer or network without authorization. • The practice of recovering sensitive information from discarded material. • ...
IT Security 1 2017-05-19
Across
- This involves the illegal copying of information from the magnetic strip of a credit card.
- is a program that causes the computer to dial premium (high rate) telephone numbers without the user’s knowledge or consent.
- A type of online identity theft. It uses email and fake websites that are designed to steal your personal data or information such as bank card numbers and passwords.
- is a program that allows the user to monitor what another user types into a device. It involves recording consecutive key strokes on a keyboard.
- consists of two or more computer systems and other peripherals (printers, scanners etc.) linked together.
- is the process of moving an infected file, such as a virus, into an area where it cannot cause harm.
- is a security mechanism that uses information about the physical characteristics of a person to verify the person’s identity and then provides access to a computer network.
- is another type of malware that is activated each time a computer system boots (loads) up.
- involves gaining access to a computer or network with authorization from a company or organisation.
- is the processed output of data making it meaningful to the person who receives it.
- This involves gaining personal information through deception.
- involves gaining access to a computer or network without authorization.
- is a type of malware that self-replicates and distributes copies of itself in a computer network.
Down
- is the conversion of data into a form that cannot be easily understood by unauthorized people.
- also known as zombie is a group of computers connected together for malicious purposes.
- is a software application that automatically displays advertising banners while the program is running.
- This involves watching someone use his/her computer from “over his/her shoulder” to get sensitive information such as username and password.
- occurs when someone steals the identity of another person and uses this to gain access to resources and other benefits in that person’s name.
- is a secret way to access a computer without passing security mechanisms.
- is a program that secretly installs itself on computers and collects information about users without their knowledge.
- refers to any crime that involves a computer and a network.
- is the process of manipulating people to perform some action that will lead unauthorised users to break into a computer or network.
- involves modifying a computer program to remove or disable features such as copy protection, serial numbers, hardware keys, date checks etc.
- is raw unorganized facts that need to be processed.
- is malicious software designed to install itself on a computer without the owner’s knowledge.
- The practice of recovering sensitive information from discarded material.
- is a system designed to prevent unauthorized access to or from a private network (LAN).
- is sequences of instructions that make a computer program perform a specific task.
- it attaches itself to a program or file and spreads from one computer to another, leaving infections as it travels.
29 Clues: is raw unorganized facts that need to be processed. • refers to any crime that involves a computer and a network. • This involves gaining personal information through deception. • involves gaining access to a computer or network without authorization. • is a secret way to access a computer without passing security mechanisms. • ...
sarah oconnor 2019-11-05
Across
- designed to detect and destroy computer viruses.
- Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware.
- software that is available free of charge.
- processor a program or machine for storing, manipulating, and formatting text entered from a keyboard and providing a printout.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- is a hardware component that allows a computer or another device
Down
- A horse or Trojan is a type of malware that is often disguised as legitimate software.
- the programs and other operating information used by a computer.
- software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.
- a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid.
- infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
- boot or be booted again.
- a standalone malware computer program that replicates itself in order to spread to other computers
- a separate viewing area on a computer display screen in a system that allows multiple viewing areas as part of a graphical user interface
- messages distributed by electronic means from one computer user to one or more recipients via a network.
15 Clues: boot or be booted again. • software that is available free of charge. • designed to detect and destroy computer viruses. • the programs and other operating information used by a computer. • is a hardware component that allows a computer or another device • A horse or Trojan is a type of malware that is often disguised as legitimate software. • ...
Networking puzzle,class 8 2025-06-07
Across
- A network device that is used to connect all computers woth each other in a network.
- A network device that connects a computer to an available internet connection.
- Sets of rules determining how data should be encoded.
- A computer network restricted to an organisation.
- Computer network mainly created for an individual person.
- A network security system (wall) that blocks malware.
- A system that allows devices to connect to the internet wirelessly using radio waves.
Down
- The word that means without a wire.
- A wireless technology used to interconnect electronic devices.
- Mobile phones are one of these too.
- Important for protecting the data and resources from unauthorised users.
- A device that connects two different types of networks with each other.
- Layout in which various components of a network communicate with each other.
- Connection between computers.
- Amount of data that can be transferred over a network in a given time.
- Short form of Wide Area Network.
16 Clues: Connection between computers. • Short form of Wide Area Network. • The word that means without a wire. • Mobile phones are one of these too. • A computer network restricted to an organisation. • Sets of rules determining how data should be encoded. • A network security system (wall) that blocks malware. • Computer network mainly created for an individual person. • ...
cybersecurity crossword 2022-12-02
Across
- software that that enters a computer system without the users knowledge or consent and makes the comuter go bad
- software that prevents you from getting unwanted viruses on your device
- software that runs as a program on the local computer
- an attacker who controls a botnet
- a logical computer network of zombies under the control of an attacker
- software made to stop the spread of malware
- a malicious program designed to enter a computer via a network to take advantage of a vulnerability in a application or an operating system
- a new software made that was better the old one and fixes things that were bad or old in the old software
- software that prevents you from getting infected from differents spyware
- a set of software tools used by an attacker to hide the actions or presence of other types of malware
- software code that gives access to a program or service
Down
- a software program that gives advertising content that is unwanted by the user
- a microsoft windows function that provides info to users and obtains their approval before a program can make a change to the computers settings
- a undate that makes the software better or more efficient
- an infected computer that is under the remote control of an attacker
- getting information from a device without the owner knowing
- a backup of your data saved on a hard
- software that keeps data on where you hit the keyboard
- data that is compromised and wont be given back unless a fee is paid
19 Clues: an attacker who controls a botnet • a backup of your data saved on a hard • software made to stop the spread of malware • software that runs as a program on the local computer • software that keeps data on where you hit the keyboard • software code that gives access to a program or service • a undate that makes the software better or more efficient • ...
Wired networking 2020-10-14
Across
- What uses optical fiber cables?
- What has 8 colored wires?
- What are unauthorized users going to run into while trying to intercept data?
- What is there less of while using wired networking?
Down
- What uses twisted-pair cables?
- What is faster when using wired networking?
- What uses coaxial cables?
- What is made of glass?
- How many wired transmission types are there?
- How many wired media types are there?
- How many Cat types are there?
11 Clues: What is made of glass? • What has 8 colored wires? • What uses coaxial cables? • How many Cat types are there? • What uses twisted-pair cables? • What uses optical fiber cables? • How many wired media types are there? • What is faster when using wired networking? • How many wired transmission types are there? • What is there less of while using wired networking? • ...
Computing Keywords 2014-11-10
Across
- A device that shows commands with pictures and light.
- Information that can be stored in many different types.
- Saved data that you can access again and edit.
- Every tiny square on your computer screen.
- Requires electricity and is programmed with commands.
- Something that can control certain things and is programmed.
Down
- Data processed to do several things.
- A type of coding used with a computer with 0's and 1's.
- An electronic device that picks up sound as a command.
- Files or folders which are saved onto the computer.
10 Clues: Data processed to do several things. • Every tiny square on your computer screen. • Saved data that you can access again and edit. • Files or folders which are saved onto the computer. • A device that shows commands with pictures and light. • Requires electricity and is programmed with commands. • An electronic device that picks up sound as a command. • ...
Vocabulary 2016-09-20
Across
- information at the head/top of every page
- Short for hyper-text markup language; file format for documents viewed using a browser network. The language of the web.
- the state of being connected to the Internet.
- Name given to file. Made up of two parts - main name and extension.
- A list of steps that you can follow to finish a task.
- To choose part of a document by clicking and dragging over it with the mouse to highlight the text.
- The act of transferring a file from a local computer to a website on the interenet.
- short for internet etiquette; the code of acceptable behaviors you should follow while on the internet
- unique combination of characters such as letters of the alphabet and/or numbers that identifies a specific user
- A personal computer built by Apple that uses the Mac OS
- Programs that allow you to accomplish certain tasks such as write letters, analyze numbers, sort files, manage finances, draw pictures, and play games.
- short for Uniform Resource Locator; an address for documents found on the Web.
- An optical disc commonly used as a medium for digital representation of movies and other multimedia presentations that combine sound with graphics.
- application software that allows users to access and view web pages. Examples include Safari, Chrome, Internet Explorer, etc...
- The act of transferring a file from the internet to a local computer.
- unique address for a web page, another name for an URL
- A high-speed Internet connection that is always connected
- Technology that prevents users from visiting inappropriate web sites.
- An acronym for "binary digit." This is the smallest storage unit in a computer.
- information that appears at the foot/bottom of every page
- world wide connection of networks that connect millions of businesses, government agencies, educational institutions, and individual
- The parts of the computer you cannot touch - A set of instructions that tells the computer what to do.
- the main page of a Web site.
- Disk or Hard Drive Secondary/External memory: Non-removable and used a rigid metallic disk or platter
Down
- The part of an Internet address that identifies the website. CNN is the domain of www.cnn.com
- short for wireless fidelity; type of broadband internet connection that uses radio signals to provide high speed internet connections
- short for electronic mail; mail that is sent by your computer to anyone in the world with an e-mail account.
- AKA memory stick or thumb drive - portable place to store files
- Short for Operating System. The basic set of instructions that controls the computer. There are many different types including Windows, Mac, IOS,Linux, Android etc...
- An application designed to search for viruses and repair files on a computer.
- arrow like icon on the desktop that moves with the mouse, showing were the mouse is pointing.
- How your text conforms to the left and right margins of a page. The text can be right-aligned, centered, left-aligned, or fully-aligned/justified.
- Compact Disc-Read-Only Memory, a type of optical disk capable of storing large amounts of data;
- short for Internet Service Provider; a company that provides access to the Internet.
- A metaphor used to describe the user interface which consists of icons, files, folders and documents that is seen in an operating system.
- Part of the filename that normally indicates the program in which the file was created and will use to open.
- Those parts of a computer system that you can see and touch, such as, keyboard, monitor, printer
- A personal computer that uses Windows, Linux or another operating system. Brands include Dell, HP, Asus, Lenovo and Acer to name a few.
- A rectangular area on the desktop within which you see a program or data.
- A connection of computers - usually to share resources such as printers or files.
- a computer or device on a network that stores and manages network resources and responds to requests for information. Different types include file and print.
41 Clues: the main page of a Web site. • information at the head/top of every page • the state of being connected to the Internet. • A list of steps that you can follow to finish a task. • unique address for a web page, another name for an URL • A personal computer built by Apple that uses the Mac OS • A high-speed Internet connection that is always connected • ...
Peripherals 2015-10-13
Across
- used to copy physical printed materials into the computer. Scanners are often incorporated into printers
- input device used to control the pointer on the screen of a computer
- used to print photographs, images and text onto paper and card
- used to record sounds and communicate over the internet
- Near Field Communication built on RFID
- these enable users to control the computer by blinking
- came with the original Nintendo Wii
- used to control a device with fingers or a stylus
- wireless connection built for short ranges
Down
- motion sensor plugged into the computer through a usb connection
- designed for use with Microsoft's Xbox
- gives us access to the programs and the file system through a command line interface (CLI) or a graphical user interface (GUI)
- gives outputs that the user can sense based on inputs
- different types of cards use magnetic bands to store information
- similar to a mouse, this is used where extreme accuracy is needed
15 Clues: came with the original Nintendo Wii • designed for use with Microsoft's Xbox • Near Field Communication built on RFID • wireless connection built for short ranges • used to control a device with fingers or a stylus • gives outputs that the user can sense based on inputs • these enable users to control the computer by blinking • ...
Software 2021-01-16
Across
- Tasks running on a computer, including application programs
- A copy of the files in another location so that they could be accessed if the original files have been damaged, lost or stolen
- A change or addition to a computer file, so that it has the most recent information
- A computer program that only allows certain types of information to pass through it
- a software which controls the data that travels into and out of the network
- The algorithm that the OS uses to allow each running process to use the CPU
- System A software designed for one particular hardware and which manages other programs’ access to the hardware
- A software, possibly a virus that has been secretly installed on a user's computer and could record private information as it is being entered
- A utility that moves file clusters on a disk so that they are closer to each other to improve speed up disk access
- A computer image stored and printed in the arrangement of bits
- Utilities that have been used to reduce the size of a file or a set of files
Down
- A type of Utility software that prepares storage media such as a hard disk or USB flash drive for its first use
- a type of algorithm that can find a solution to a problem quickly and easily
- a group of things together that are of the same type
- A link that could be clicked on to go to another location
- The ease which a device or application could be used
- Software that could create multiple copies of itself and requires a network to spread to the connected devices
- A proprietary software that is provided free of charge to users
- Brocken into pieces
- The process of proving a computer system who you are
20 Clues: Brocken into pieces • a group of things together that are of the same type • The ease which a device or application could be used • The process of proving a computer system who you are • A link that could be clicked on to go to another location • Tasks running on a computer, including application programs • ...
Computer Anatomy 2021-02-17
Across
- houses all the computer's components
- used for older keyboards and mice
- power supply unit
- basic input/output system
- houses graphics card
Down
- connects different types of peripherals
- lots of peripherals need this to work
- connects to printers and scanners
- controls sound quality
- temporary storage
- permanent storage
- needed to use mice and keyboards
- the brain of the computer
13 Clues: temporary storage • permanent storage • power supply unit • houses graphics card • controls sound quality • basic input/output system • the brain of the computer • needed to use mice and keyboards • connects to printers and scanners • used for older keyboards and mice • houses all the computer's components • lots of peripherals need this to work • ...
Networking concept 2025-06-19
Across
- it is a_____topology
- it is a set of______ computer
- It is a computer network that is created for a individual person
- It connects all the computer in a network with each other
Down
- it connects two different types of network
- It is a small area network
- It is a large network then lan
- The kind of network that connects two or more computer located at distant places
8 Clues: it is a_____topology • It is a small area network • it is a set of______ computer • It is a large network then lan • it connects two different types of network • It connects all the computer in a network with each other • It is a computer network that is created for a individual person • The kind of network that connects two or more computer located at distant places
Networking concept 2025-06-19
Across
- it is a_____topology
- it is a set of______ computer
- It is a computer network that is created for a individual person
- It connects all the computer in a network with each other
Down
- it connects two different types of network
- It is a small area network
- It is a large network then lan
- The kind of network that connects two or more computer located at distant places
8 Clues: it is a_____topology • It is a small area network • it is a set of______ computer • It is a large network then lan • it connects two different types of network • It connects all the computer in a network with each other • It is a computer network that is created for a individual person • The kind of network that connects two or more computer located at distant places
What do you do? 2013-05-29
14 Clues: educates • cuts hair • helps cats • grows food • gives news • brings food • fights fires • sells clothes • teaches sports • works with wood • fixes the toilet • catches bad people • types on a computer • helps you when you are sick
NETWORKING 2012-11-07
Across
- / ability to transfer data only in one direction at a time
- / the part of a network communications process that
- / all the physical parts of the computer system
- / a main computer that provides a storage area for data files on a network
- / an electronic device used to convert signals from analogue into digital ones.
- / a low-cost centrally- managed basic computer with a keyboard and display, but no disk drives or expansion sots
- / ability to transfer data on both directions simultaneously
- / a hardware device, often equipped with a keyboard and screen, through which data can be entered or displayed
- / the part of a network communications process that ensures the message is transmitted in a language that the receiving computer can interpret
- / an electronic device that isolates a network system from high voltage and allows it to use the mains electricity cables for connecting computers together and transferring data
- / a type of signal that has only two levels- on and off
- / programs and applications
- / a main data communication s cable connecting LANs together
- / a network computer that does some of the processing
- / stop-start transmission, data is sent one byte at a time
- / a data bit that marks the end of a data block in a network transmission
- / the computer that uses the services
- / an electronic device for connecting different types of networks together
Down
- / the only part of a network communications process that a user sees etc.
- / the most common way of connecting computers in LAN
- / the part of a network communications process that opens communications and has the job of keeping the straight the communications among all nodes on the network. It sets boundaries for the beginning and end of the message and establishes the way data is sent.
- / a network that covers a small area e.g. an office or a building
- / a common type of network cable that uses two wires twisted together to reduce interference from external signals
- / the part of a network communications process that
- / the interconnection of computers using signals carried through the air instead of through the connecting cables
- / calculated value that is stored with data to detect any errors that may occur when data is copied or transmitted
- / an electronic device for connecting different types of networks together and determining the best path for the signals
- / transmission where data is sent in blocks
- / an electronic device for dividing a LAN into separate parts or connecting similar networks together
- / a network computer that doesn’t have a processor, all the processing must be done by the server computer
- / a type of Network where the main server provides the services and client computers are attached
- / the part of a network communications process that forms the data into packets and selects a route for the message
- / the part of a network communications process that protects the data being sent. It subdivides the message into segments and creates the checksum.
- / a type of signal that can take any value from minimum to maximum
- / a start or stop bit pattern that marks the beginning or end of a transmitted data block
- / a data bit that marks the beginning of a data block in a network transmission
- / an electronic device at the center of a star network topology, amplifies the signals
37 Clues: / programs and applications • / the computer that uses the services • / transmission where data is sent in blocks • / all the physical parts of the computer system • / the part of a network communications process that • / the part of a network communications process that • / the most common way of connecting computers in LAN • ...
CompTIA ITF 1 2 3 Crossword Puzzle 2022-03-31
Across
- Which of the following language types is closest to the native commands recognized by a computer processor?
- Which of the following fields is MOST likely used as a primary key in a database? Mobile phone
- Which of the following BEST describes software components that allow as OS to directly communicate with a piece of attached hardware?
- A global variable called “age” will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
- Which of the following is the BEST for a user who travels frequently and needs internet access?
- A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
- Which of the following storage types is most useful for sharing files between home users in different countries?
Down
- After implementing the solution on a user’s system, which of the following troubleshooting steps should be performed NEXT?
- Which of the following BEST describes operators that are used to connect search terms?
- Which of the following should typically be known BEFORE installing software?
- Which of the following is primarily designed to be connected to a television for accessing internet-based movies?
- A database administrator has created an object that retrieves a collection of specific records in a native format. Which of the following BEST describes what the database administrator created?
- A Security administrator is adding accounting features to a web application. Which of the following would be the BEST action?
- Ann, a user, updates the driver for a webcam on a computer. But the update fails. The webcam is not working anymore. Ann should
- Which of the following uses the base 2 numbering system?
15 Clues: Which of the following uses the base 2 numbering system? • Which of the following should typically be known BEFORE installing software? • Which of the following BEST describes operators that are used to connect search terms? • Which of the following fields is MOST likely used as a primary key in a database? Mobile phone • ...
Anatomy of a COmputer 2020-09-30
Across
- It is the port that connects your mouse and keyboard to your computer
- more modern types of peripherals use this port to connect to your pc
- It is what houses your graphic card which allows videos to be displayed on your monitor
- These are how you used to connect your mouse and keyboard to your computer
- It is the brains of your computer
- It is how you computer gets power
- That large circuit board that houses most of the computers parts
- It is a port that allows you to connect to peripherals
Down
- This is an another way to connect your peripherals but is used less these days since there are fast and better alternatives
- It is that basic OS that comes with the motherboard
- They are what allow peripherals to communicate with the processor
- It is where the CPU temporarily stores data
- This is what allows you to hear audio
13 Clues: It is the brains of your computer • It is how you computer gets power • This is what allows you to hear audio • It is where the CPU temporarily stores data • It is that basic OS that comes with the motherboard • It is a port that allows you to connect to peripherals • That large circuit board that houses most of the computers parts • ...
UNIT TEST III 2023-02-06
Across
- is the best example of Computer Vision.
- was the first computer scientist to connect a camera to a computer.
- automatically detects the language you type and translates it to the language you want.
- of Big Data refers to the speed at which data is being generated.
Down
- is the large volume of data that is required to run a business.
- is the Father of Computer Vision.
- is the time taken by a device to respond to a requestDeep learning is a subset of machine learning that learns features and tasks directly from the data.
- of Big Data refers to different types of data.
- technologies use NLP’s text classification abilities to scan emails of a language for threat.
- is the first image recognition app released by Google.
- of Big Data refers to the amount of data being generated.
- is the branch of AI that enables machines to understand human language.
12 Clues: is the Father of Computer Vision. • is the best example of Computer Vision. • of Big Data refers to different types of data. • is the first image recognition app released by Google. • of Big Data refers to the amount of data being generated. • is the large volume of data that is required to run a business. • ...
3.1 Malware 2021-10-19
Across
- tracking software that is deployed without the consent or control of the user
- an executable program that masquerades as performing a benign activity but also does something malicious
- silently captures and stores each keystroke that user types
- gives access to a computer, program, or service that circumvents any normal security protections
- malware that encrypts all the files on the device
- a malicious program that uses a computer network to replicate
Down
- Malware that prevents a user's endpoint device from properly and fully functioning until a fee is paid
- malware that can hide its presence and the presence of other malware on the computer
- bomb computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
- infected robot computer
- software that the user does not want on their computer
11 Clues: infected robot computer • malware that encrypts all the files on the device • software that the user does not want on their computer • silently captures and stores each keystroke that user types • a malicious program that uses a computer network to replicate • tracking software that is deployed without the consent or control of the user • ...
