Key Terms Modules 1 - 6

1234567891011121314151617181920212223242526272829
Across
  1. 5. read-only memory Permanently installed memory on your computer attached to the motherboard. The ROM chip contains the BIOS, which tells your computer how to start.
  2. 6. Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
  3. 7. A wireless data network technology that provides high-speed data connections that do not require a physical connection. It is used for mobile devices.
  4. 8. To copy or use someone else’s work and claim it as your own.
  5. 9. Short for “application,” a computer program that performs specific tasks; also called a program.
  6. 14. Memory that loses its contents when power is removed.
  7. 15. The most common storage medium on a computer; can be magnetic or solid state.
  8. 16. Business transactions that occur over an electronic network such as the Internet.
  9. 19. A practice that involves reducing electricity consumed and environmental waste generated when using computers, mobile devices, and related technologies.
  10. 21. A collection of related worksheets contained within a single file.
  11. 23. Information processed into a useful form such as text, graphics, audio, video, or any combination of these.
  12. 25. A three- or four-letter sequence, preceded by a period, at the end of a filename that identifies the file as a particular type of document, such as .docx or .xlsx.
  13. 26. Apps like Amazon’s Alexa or Apple’s Siri that use natural language processing to respond to your verbal commands or questions, using search technology to provide answers or perform a task, such as adding an item to a grocery list,
  14. 29. The manner in which a slide appears on the screen in place of the previous slide during a slide show.
Down
  1. 1. In Computer Concepts, a device used to point to and select specific objects on the computer screen. Examples of point devices include a mouse, touchpad, and trackball.
  2. 2. A device that protects computer equipment by absorbing electrical spikes, surges, or noise before they can reach the equipment.
  3. 3. Law that requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers. Americans with Disabilities Act
  4. 4. Similar to a desktop computer, but the monitor and system unit are housed together.
  5. 6. A grid of cells that contain numbers and text; in Microsoft Excel, a spreadsheet is called a worksheet.
  6. 10. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  7. 11. A global collection of millions of computers linked together to share information.
  8. 12. The use of computers to simulate a real or imagined environment that appears as a three-dimensional (3-D) space. Virtual Reality
  9. 13. The technological use of logic and prior experience to simulate human intelligence. Artificial Intelligence
  10. 17. A storage area located on a server that you access through the Internet or a network.
  11. 18. A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie.
  12. 20. A complex integrated circuit that consists of millions of electronic parts and is primarily responsible for converting input (data) into meaningful output (information). Central Processing Unit
  13. 22. A grid of square colored dots, called pixels, that form a picture; also, a file containing a graphic that consists of a bitmap.
  14. 24. In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
  15. 27. Any data and instructions entered into the memory of a device.
  16. 28. Using someone’s personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.