Crossword

123456789101112131415161718192021
Across
  1. 1. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
  2. 3. Set of programs and routines that allow the computer to perform certain tasks.
  3. 5. Is a data storage device that uses a magnetic recording system to store and retrieve digital files.
  4. 7. It is a unit of measurement of the frequency.
  5. 9. It is an input device or peripheral, which uses a system of stitches or margins, to act as mechanical levers or electronic switches that send all the information to the computer.
  6. 11. Computer device that is operated with one hand and allows you to direct the movement of the pointer on the screen to transmit various commands.
  7. 13. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  8. 17. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  9. 18. Set of data belonging to the same context and systematically stored for later use.
  10. 20. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
  11. 21. Is a magnetic type data storage medium.
Down
  1. 1. It is a printed circuit board to which the components that make up the computer are connected.
  2. 2. Type of optical disc for data storage.
  3. 4. Computer main memory, where programs and data reside.
  4. 6. It is a mass storage device that uses flash memory to store the information you may require.
  5. 8. Problem in a computer program or software system.
  6. 10. Removable flash memory card used to store digital information, such as programs and files.
  7. 12. Peripheral computer output device that enables a permanent range of texts or graphics to be produced from documents stored in an electronic format to physical media.
  8. 14. A technique used by hackers to obtain sensitive information.
  9. 15. Electronic device used to reproduce digital files with this compression format
  10. 16. It is a similar technology from the aspect of the connection
  11. 19. A defensive technology designed to keep the bad guys out.