Crossword 6
Across
- 3. A button on a Windows operating system desktop that allows users to access computer programs, files, and settings.
- 5. A malicious program that is disguised as something else. Trojan horses may be used to steal or destroy data, crash systems, or replicate to other systems.
- 7. Definition
- 8. Virtual private network (VPN) is a computer network that can help create a secure connection to the internet.
- 9. A universal serial bus (USB) is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.
- 11. An application that completes tasks based on the voice commands it is given by a user.
- 12. The time a user spent on a website. The time (session) is used to measure that websites traffic.
Down
- 1. Communication that happens in real time.
- 2. Commands and special characters used to refine search engine results.
- 3. A malicious software program that spies on the user and shares the information with a third party.
- 4. An element on a computers desktop where buttons, icons, menus, and other elements are placed.
- 6. A means of communication using video and audio to speak in real time with others over the internet.
- 10. A wireless connection to the internet.