examples
Across
- 5. A COMPUTERS MEMORY
- 6. ANY PHYSICAL DEVICE ON YOUR COMPUTER
- 8. THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- 11. CONNECTED TO A NETWORK OR THE INTERNET
- 13. SHORT FOR MALICIOUS SOFTWARE
- 15. ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- 17. A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- 19. ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
- 20. a security protocol used in wi-fi networks
- 21. SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- 22. UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- 24. RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- 26. A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- 27. A set of interconnected networks that allow computers in different locations to exchange information
- 28. MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
Down
- 1. COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- 2. READ ONLY MEMORY
- 3. to extract and decompress compressed files from it
- 4. A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- 5. CANNOT BE EDITED
- 7. REDUCE SIZE OF A FILE
- 9. A point within a network that interconnects with other networks.
- 10. SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- 12. A WAY OF SENDING MESSAGES OVER THE INTERNET
- 14. DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- 16. COMPRESS TO ONE FILE
- 18. a security protocol used in wi-fi networks
- 23. CREATED BY ADOBE SYSTEMS INC
- 25. TYPE OF EMAIL FRAUD