Brock Crossword

12345678910111213141516171819202122232425
Across
  1. 6. small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
  2. 7. a type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
  3. 8. the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions
  4. 11. an electro-mechanical data storage device that stores and retrieves digital data
  5. 12. a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
  6. 15. a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing.
  7. 17. an application for accessing websites.
  8. 20. a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
  9. 23. the responsible, respectful and safe, use of technology in daily life, along with online safety, and privacy,
  10. 24. a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
Down
  1. 1. the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
  2. 2. a computing device designed to fit on top of a typical office desk.
  3. 3. a a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
  4. 4. the ability to responsibly use digital technologies,and the internet to find,, use, share, and create i google
  5. 5. Wi-Fi is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
  6. 9. a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
  7. 10. a mobile device that combines traditional mobile technology with more advanced computing abilities.
  8. 13. technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.
  9. 14. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
  10. 16. a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage
  11. 18. a quotation from or reference to a book, paper, or author,
  12. 19. the practice of pretending on social media to be someone different, in order to trick or attract another person
  13. 21. a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
  14. 22. a form of social engineering and a scam where attackers on or installing malware such as viruses, worms, adware, or ransomware.
  15. 25. a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.