Crossword 6

123456789101112
Across
  1. 3. A button on a Windows operating system desktop that allows users to access computer programs, files, and settings.
  2. 5. A malicious program that is disguised as something else. Trojan horses may be used to steal or destroy data, crash systems, or replicate to other systems.
  3. 7. Definition
  4. 8. Virtual private network (VPN) is a computer network that can help create a secure connection to the internet.
  5. 9. A universal serial bus (USB) is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.
  6. 11. An application that completes tasks based on the voice commands it is given by a user.
  7. 12. The time a user spent on a website. The time (session) is used to measure that websites traffic.
Down
  1. 1. Communication that happens in real time.
  2. 2. Commands and special characters used to refine search engine results.
  3. 3. A malicious software program that spies on the user and shares the information with a third party.
  4. 4. An element on a computers desktop where buttons, icons, menus, and other elements are placed.
  5. 6. A means of communication using video and audio to speak in real time with others over the internet.
  6. 10. A wireless connection to the internet.