Untitled

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 3. a collection of data that has a name (called the filename). Almost all information on a computer is stored in some type of file. Examples: data file (contains data such as a group of records); executable file (contains a program or commands that are executable); text file (contains data that can be read using a standard text editor).
  2. 9. a virus is a piece of programming code inserted into other programming to cause damage. Viruses can be sent in many forms but are often transmitted via email messages that, when opened, may erase data or cause damage to your hard disk. Some viruses are able to enter your email system and send themselves to other people in your list of contacts.
  3. 11. the process of identifying yourself and the verification that you're who you say you are. Computers where restricted information is stored may require you to enter your username and password to gain access.
  4. 14. wi-fi is a technology that allows computers and other devices to communicate via a wireless signal. Essentially, it means you can browse the internet without tripping over phone cords.
  5. 17. encryption is the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
  6. 18. how data is collected, stored, accessed, and used in companies and organizations
  7. 20. hyper-text markup language (HTML) is a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
  8. 22. a form of algebra in which all values are reduced to either true/false, yes/no, on/off, or 1/0.
  9. 26. A complete assortment of letters, numbers, and symbols of a specific size and design. There are hundreds of different fonts ranging from businesslike type styles to fonts composed only of special characters such as math symbols or miniature graphics
  10. 27. the page that an Internet browser first opens up to. It is usually the starting point of an organisation's or individual's website.
  11. 29. spam refers to unsolicited email messages sent for marketing purposes.
  12. 33. a file that can be opened and read by standard text editor programs (for example, Notepad or Simple Text) on almost any type of computer. Also referred to as "plain text files". Examples: documents saved in ASCII format within word processors like Microsoft Word or WordPerfect; e-mail messages created by a program like Outlook; or HTML files.
  13. 36. jpeg stands for Joint Photographic Experts Group, which was the committee that created the file format known as JPEG. The format is commonlyl used for photos displayed on the world wide web.
  14. 37. bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
  15. 42. resolution refers to the number of distinct pixels that make up the display on a computer monitor. It is denoted in DPI (dots per inch). The higher the resolution, the finer and smoother the images appear when displayed at a given size.
  16. 43. cybercrime is any type of illegal activity that is undertaken (or relies heavily) on a computer. There are thousands of types of cybercrime, including network intrusions, identity theft and the spreading of computer viruses.
  17. 45. a software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
  18. 46. email or electronic mail is a way of sending messages over the internet. Popular email programs include Outlook, Mozilla Thunderbird, Gmail and Yahoo Mail.
  19. 47. a term that is often used to describe the main network connections that comprise the Internet or other major network.
  20. 48. random access memory (RAM) is usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
Down
  1. 1. a search engine enables a computer user to search information on the Internet. It is a type of software that creates indexes of databases or Internet sites based on the titles of files, keywords, or the full text of files. The most popular search engines are Google.com.au, Yahoo.com.au and Bing.com.au.
  2. 2. a server is a computer that handles requests for data, email, file transfers, and other network services from other computers.
  3. 4. data visualization is the use of graphs, charts, tables, infographics, etc. in order to define and communicate data being analyzed and the the findings that have come from it.
  4. 5. data architecture describes the way data is collected, stored, accessed, and used in companies and organizations. It can be seen as the roadmap for how data flows across an organization’s IT systems and applications.
  5. 6. java is a programming language that is commonly used in the development of client-server web applications.
  6. 7. refers to:1) a region of computer memory where frequently accessed data can be stored for rapid access; or 2) a optional file on your hard drive where such data also can be stored. Examples: Internet Explorer and Firefox have options for defining both memory and disk cache. The act of storing data for fast retrieval is called "caching".
  7. 8. a domain is a set of computers on a network that are managed as a unit.
  8. 10. an intranet is basically a private, internal internet specific to an organisation or group.
  9. 12. identifies the location of an Internet resource.
  10. 13. downloading is the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
  11. 15. a program capable of running on any computer regardless of the operating system. Many applets can be downloaded from various sites on the Internet.
  12. 16. to zip files is to archive and compress them into one file of smaller size using a program such as WinZip. It's a handy way to make files smaller before sending them via email.
  13. 19. a bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
  14. 21. broadband is a type of communications technology whereby a single wire can carry more than one type of signal at once; for example, audio and video. Cable TV is one technology that uses broadband data transmission.
  15. 23. a local area network (LAN) is a system that connects computers and other devices that share a common communications line and wireless link, generally within a limited geographical area such as a home or office building.
  16. 24. ethernet is the most common way of connecting computers on a network with a wired connection. It is a type of local area network (LAN) technology, providing a simple interface for connecting multiple devices.
  17. 25. the processor is the brains of your computer. It is responsible for performing calculations and tasks that make programs work. The faster the processor, the faster the computer works.
  18. 28. a chip is a microprocessor that performs many functions and calculations that make your computer run. Your computer's chip is also referred to as the CPU (Central Processing Unit) or the processor.
  19. 30. a protocol is a standard or set of rules that computers and other devices use when communicating with one another.
  20. 31. a program designed for a specific purpose, such as word processing or graphic design.
  21. 32. a special type of modem that connects to a local cable TV line to provide a continuous connection to the Internet. Like an analog modem, a cable modem is used to send and receive data, but the difference is that transfer speeds are much faster. A 56 Kbps modem can receive data at about 53 Kbps, while a cable modem can achieve about 1.5 Mbps (about 30 times faster). Cable modems attach to a 10Base-T Ethernet card inside your computer.
  22. 34. a set of interconnected networks that allow computers in different locations to exchange information. The Internet includes services such as the world wide web, electronic mail, file transfer protocol (FTP), chat and remote access to networks and computers.
  23. 35. cybersecurity refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
  24. 38. rom stands for read-only memory. It is the part of a computer's memory that cannot be changed by a user. The contents of ROM remain even when the computer is turned off.
  25. 39. web servers are computers used to store websites, online apps, documents, pictures, or other data, and can be accessed through the internet by way of applications like web browsers or file transfer protocol (FTP) clients. When you visit a website with the browser on your computer or smartphone, you are requesting it from a web server.
  26. 40. domain Name System; a service for accessing a networked computer by name rather than by numerical, (IP) address.
  27. 41. the physical place where a computer stores information - applications and files - is known as its hard disk drive (HDD). The bigger the HDD, the more data it can store.
  28. 44. Graphics Interchange Format; a format for a file that contains a graphic or a picture. Files of this type usually have the suffix ".gif" as part of their name.Many images seen on web pages are GIF files
  29. 47. big data is a term for collections of data that are so large they can’t be processed through traditional data processing systems. These collections come from sources like mobile devices, emails, search keywords, user database information, applications, and servers. By finding ways to comb through this data, companies can identify consumer patterns and use them to predict and optimize their business.