Computer Stuff - Charlie Stacey

123456789101112131415161718192021222324
Across
  1. 3. the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
  2. 5. a dot in the image
  3. 10. OS that is owned by the Google company.
  4. 11. Similar to a typewriter, contains the letters for typing text, and keys that give the computer its commands.
  5. 12. 8 bits
  6. 16. automatically check for errors on the computer system. They will look for bad sectors on a disk and files which have been fragmented and either automatically correct the file or notify the user of what needs to be done.
  7. 18. GUI facilitates running commands by selecting from a menu.
  8. 20. Area on screen where icons are grouped
  9. 21. Anyone who uses a computer connected to the Internet.
  10. 22. Information is stored once, usually by the manufacturer, that cannot be changed.
  11. 23. a type of computer memory that can be accessed randomly
  12. 24. It restrict the incoming and outgoing access to a network by analysing the data and determining whether it should be allowed through or not, based on a predetermined set of rules.
Down
  1. 1. was designed to be used for the Apple iPhone and is not able to work on other systems
  2. 2. Screen an be divided into different areas. In each window you can run a different program or display a different file.
  3. 4. is used to prepare a storage device so that it is ready to be used for the first time.File Transfer software assists in moving files from one computer system to another. It will make sure that the correct number of data packets are sent at the expected time and that the data is in a suitable format to be transferred.
  4. 6. Symbol (pointer) moved to select objects and commands. Controlled by pointing device.
  5. 7. protection stops people from being able to illegally monitor other peoples’ use of their computer, including the keys the user types in, which could disclose personal banking details and passwords.
  6. 8. Account name or user ID.
  7. 9. OS used by Apple computers and recent developments means that it now works extremely well with cloud computing.
  8. 13. A string of characters that a program, computer operator, or user must supply to meet security requirements before gaining access.
  9. 14. Half a byte
  10. 15. software searches for, detects and destroys viruses which could damage or corrupt the computer system.
  11. 17. The main internal component of a computer where executions of instructions are carried out and calculations are performed.
  12. 19. A program that can make a copy of itself without you necessarily being aware of it; some viruses can destroy or damage files, and generally the best protection is to always maintain backups of your files