examples

1234567891011121314151617181920212223242526
Across
  1. 1. a security protocol used in wi-fi networks
  2. 3. MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
  3. 4. RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
  4. 7. DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
  5. 10. THE FASTER THE.... THE FASTER THE COMPUTER WORKS
  6. 11. ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
  7. 14. A set of interconnected networks that allow computers in different locations to exchange information
  8. 16. SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
  9. 20. COMPRESS TO ONE FILE
  10. 21. CREATED BY ADOBE SYSTEMS INC
  11. 22. A COMPUTERS MEMORY
  12. 24. CANNOT BE EDITED
  13. 25. ANY PHYSICAL DEVICE ON YOUR COMPUTER
  14. 26. ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
Down
  1. 1. a security protocol used in wi-fi networks
  2. 2. UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
  3. 3. A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
  4. 5. to extract and decompress compressed files from it
  5. 6. A point within a network that interconnects with other networks.
  6. 8. A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
  7. 9. REDUCE SIZE OF A FILE
  8. 12. READ ONLY MEMORY
  9. 13. A BARRIER THAT ACTS AS A COMPUTERS SECURITY
  10. 15. CONNECTED TO A NETWORK OR THE INTERNET
  11. 17. SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
  12. 18. COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
  13. 19. A WAY OF SENDING MESSAGES OVER THE INTERNET
  14. 21. TYPE OF EMAIL FRAUD
  15. 23. SHORT FOR MALICIOUS SOFTWARE