Brandon's Tech Dictionary Crossword Puzzle
Across
- 2. A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
- 3. The knowledge, skills, and attitudes that present children with the opportunity to be safe and empowered while using digital applications
- 6. A web browser is an application for accessing websites
- 7. A structured set of data held in a computer, especially one that is accessible in various ways
- 13. To give credit for the original source of information
- 15. A peripheral device that enables a user to input text into a computer or any other electronic machinery
- 16. Any electronic device that manipulates information or data
- 17. A modem is a hardware which connects to a computer, broadband network or wireless router
- 20. A security system that requires two separate, distinct forms of identification in order to access something
- 22. A convenient computer that is more useful and is almost as powerful as a desktop computer
- 23. A global computer network providing a variety of information and communication facilities
- 24. Any internal or external equipment or devices you can use perform major functions
Down
- 1. A device that can be used to store computer data
- 4. A device that forwards data packets to the appropriate parts of a computer network
- 5. A set of instructions, data or programs used to operate computers and execute specific tasks
- 7. When someone uses the internet in a safe and legal way
- 8. A wireless networking technology that uses radio waves to provide wireless high-speed Internet access
- 9. An output device that displays information in pictorial or textual form
- 10. A video camera that is connected to a device and allows videos and images to be online
- 11. A new type of computer designed to help you get things done faster and easier
- 12. Where the data is stored that your computer processor needs to run your applications and open your files
- 14. A sequence of characters or encoded information identifying when a certain event occurred
- 18. A deceptive activity in which a person creates a fictional persona of a fake identity on social networking services, and usually targeting a specific victim
- 19. A social engineering attack used to steal somebody's personal information
- 21. A computer network that links devices within a building or group of adjacent buildings