Computer Definitions

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 2. files embedded within online communication channels such as emails, instant messages, or social networks
  2. 5. the transmission of high-quality data of wide bandwidth.
  3. 7. a type of malware that downloads onto a computer disguised as a legitimate program
  4. 8. a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
  5. 13. the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  6. 15. used to refer to computer files or memory that can be read or used, but not changed or added to in any way
  7. 16. a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
  8. 18. the amount of data that can reside within the disk drive or storage medium to a maximum limit.
  9. 19. allows devices to communicate with each other without cables or wires.
  10. 20. the practice of protecting systems, networks, and programs from digital attacks
  11. 22. a data measurement unit applied to digital computer or media storage
  12. 23. a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
  13. 24. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  14. 26. a file format that can contain multiple files combined and compressed into one file.
  15. 27. the use or operation of computers.
  16. 28. A computer program that can copy itself and infect a computer without permission or knowledge of the user
  17. 31. the capacity at which a network can transmit data.
  18. 34. the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
  19. 38. malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
  20. 39. the logic circuitry that responds to and processes the basic instructions that drive a computer
Down
  1. 1. the ability of software and hardware from different sources to work together without having to be altered to do so
  2. 3. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
  3. 4. a software program used to locate and display information on the Internet or an intranet.
  4. 6. a unit of data that is eight binary digits long
  5. 9. Any stored data.
  6. 10. a set of rules for formatting and processing data.
  7. 11. device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
  8. 12. a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
  9. 14. the number of pixels that are displayed per inch for an image
  10. 17. computer systems that are connected to a network and are accessible to users from anywhere at any time
  11. 21. any unsolicited communication sent in bulk.
  12. 25. a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
  13. 27. small files of information that a web server generates and sends to a web browser
  14. 29. to reload the operating system of a computer:
  15. 30. the smallest unit of data that a computer can process and store.
  16. 32. the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
  17. 33. any criminal activity that involves a computer, network or networked device.
  18. 35. a tiny wafer of semiconducting material with an embedded electronic circuit.
  19. 36. a computer on a network that provides the interface between two applications or networks that use different protocols
  20. 37. an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.