Computer Terms 3
Across
- 3. - Biotech, or "biotechnology," is technology based on biology, the study of living organisms. It covers all technologies related to biological systems, including humans, animals, and the environment.
- 5. - The term "pixel" is actually short for "Picture Element." These small little dots are what make up the images on computer displays, whether they are flat-screen (LCD) or tube (CRT) monitors.
- 11. - Biometrics refers to technologies used to detect and recognize human physical characteristics.
- 13. - A proxy server improves Internet access speeds from a network primarily by using a caching system.
- 14. Point allows wireless devices to connect to the Internet.
- 15. - E-commerce (electronic-commerce) refers to business over the Internet. Web sites such as Amazon.com, Buy.com, and eBay are all e-commerce sites. The two major forms of e-commerce are Business-to-Consumer (B2C) and Business-to-Business (B2B). While companies like Amazon.com cater mostly to consumers, other companies provide goods and services exclusively to other businesses. The terms "e-business" and "e-tailing" are often used synonymously with e-commerce.
- 16. Intelligence - the ability for a computer to act like a human being.
- 17. -In computing, the term "troll" refers to a person who posts offensive, incendiary, or off topic comments online. These comments may appear in Web forums, on Facebook walls, after news articles or blog entries, or in online chat rooms.
- 18. Cache, which is pronounced "cash" (not "catch" or "cashay"), stores recently used information so that it can be quickly accessed at a later time.
Down
- 1. - Safe Mode is a way for the Windows operating system to run with the minimum system files necessary. It uses a generic VGA display driver instead of the vendor-specific driver, which means you will likely be working with only 16 colors in a resolution of 640x480. Safe Mode also turns off all third-party drivers for other peripherals such as mice, keyboards, printers, and scanners. In basic Safe Mode, networking files and settings are not loaded, meaning you won't be able to connect to the Internet or other computers on a network.
- 2. - Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture personal information by getting users to visit a fake website, pharming redirects users to false websites without them even knowing it.
- 3. - A numeric system that only uses two numbers: 0 and 1.
- 4. - Bitcoin is a digital currency that was introduced in 2009. There is no physical version of the currency, so all Bitcoin transactions take place over the Internet. Unlike traditional currencies, Bitcoin is decentralized, meaning it is not controlled by a single bank or government. Instead, Bitcoin uses a peer-to-peer (P2P) payment network made up of users with Bitcoin accounts.
- 6. - A captcha is a program used to verify that a human, rather than a computer, is entering data. Captchas are commonly seen at the end of online forms and ask the user to enter text from a distorted image.
- 7. - A file that includes multiple images/frames that’s played in order to create a little animation.
- 8. - A ping is a signal sent to a host that requests a response. It serves two primary purposes: 1) to check if the host is available and 2) to measure how long the response takes.
- 9. - Ransomware is a type of malware that prevents you from using your computer or accessing certain files unless you pay a ransom. It often encrypts your files so that they cannot be opened. Examples of ransomware include Locky, Reveton, CryptoLocker, and CryptoWall.
- 10. - Mixed reality is a blend of physical and virtual worlds that includes both real and computer-generated objects. The two worlds are "mixed" together to create a realistic environment. A user can navigate this environment and interact with both real and virtual objects.
- 12. - Scareware, also known as "rogue security software," is software that uses false error messages to lure you into purchasing a software program. These alerts or warnings may appear on websites or within applications installed on your computer. When you click the associated download link, the software is downloaded to your computer.