Computer basics
Across
- 1. The responsible and ethical use of technology and the internet.
- 8. Unsolicited or unwanted electronic messages, often sent in bulk.
- 11. A security system that protects a computer network from unauthorized access.
- 12. When something, such as a video or a post, becomes extremely popular and spreads rapidly on the internet.
- 15. A machine that can store, process, and retrieve data, and can be used for various tasks like writing documents, playing games, and browsing the internet.
- 16. A person who deliberately provokes or harasses others online to generate conflict and disruption.
- 17. A security system that protects a computer network from unauthorized access.
- 19. A device that converts physical documents or images into digital formats that can be stored or manipulated on a computer.
- 22. The physical components of a computer system, such as the keyboard, monitor, and hard drive.
- 23. An abbreviation for Universal Serial Bus, a common interface used to connect devices to a computer.
- 25. The process of transferring data or files from a local device to a remote computer.
- 26. A way of sending and receiving messages electronically over the internet.
- 28. A device with buttons or keys that allow users to input characters and commands into a computer.
- 29. A service that allows users to store and access their data remotely over the internet.
- 31. A technology that allows devices to connect to the internet wirelessly.
- 37. The screen or display unit that shows the visual output from a computer.
- 38. Small digital images or icons used to express emotions or ideas in electronic communication.
- 40. A device that produces a hard copy of digital documents or images.
- 41. A person who gains unauthorized access to computer systems or networks with malicious intent.
- 43. A digital audio or video file that can be downloaded or streamed, often discussing specific topics or featuring interviews.
- 45. Small digital images or icons used to express emotions or ideas in electronic communication.
- 46. The act of buying products or services over the internet.
- 47. Adding geographical information, such as location coordinates, to digital media like photos or posts.
- 48. Measures and practices taken to protect computer systems and data from unauthorized access or attacks.
- 49. A collection of webpages that are accessed through the internet and can contain information, images, videos, and other content.
Down
- 2. A global network of computers that allows people to connect and share information.
- 3. Online platforms that enable users to create, share, and interact with content and connect with other people.
- 4. A fraudulent practice where individuals are tricked into revealing sensitive information, such as passwords or credit card numbers, through deceptive emails or websites.
- 5. The use of electronic communication to harass, intimidate, or threaten someone.
- 6. A tool that helps users find information on the internet by entering keywords or phrases.
- 7. The use of internet-based platforms and resources to facilitate learning and education
- 9. A technology that overlays digital information, such as images or text, onto the real world.
- 10. A collection of data or information stored on a computer under a specific name and location.
- 13. The process of transferring data or files from a remote computer to a local device.
- 14. A small piece of data stored on a user's computer by a website, used to remember information and enhance the browsing experience.
- 18. An abbreviation for Uniform Resource Locator, it is the address used to access a website on the internet.
- 20. A word or phrase preceded by the "#" symbol used to categorize and group content on social media.
- 21. A secret combination of letters, numbers, or symbols used to protect personal information and restrict access to accounts.
- 24. An online platform where users can create a profile, connect with others, and share content.
- 27. A handheld input device used to move the cursor on a computer screen and make selections.
- 30. The protection of personal information and the control over what is shared and accessed on the internet.
- 32. The software that manages computer hardware and software resources and provides common services for computer programs.
- 33. The trail of data and information left behind by a person's online activities.
- 34. The process of transmitting and playing audio or video content in real time over the internet.
- 35. Programs and applications that run on a computer, allowing users to perform specific tasks.
- 36. A software application used to access and view websites on the internet.
- 39. A person who has a large following on social media and can influence the opinions and behaviors of their audience.
- 42. Playing video games over the internet, often with other players from around the world.
- 44. Software designed to harm or disrupt computers or computer networks.
- 50. A website or online platform where individuals or groups share their thoughts, opinions, and experiences.