GROVES CAITLIN

12345678910
Across
  1. 3. A device shaped like a pen that works with touch screens or graphics tablets.
  2. 5. A unique value for a record in a database.
  3. 6. A technique used to "steal" or redirect traffic that would be normally directed to another website or search engine
  4. 9. the study of the design of computer hardware
  5. 10. Is a computer connected to the Internet that has been compromised.
Down
  1. 1. Dedicated or frequent users of social media
  2. 2. A lan in which all computers are individually connected to a central connection point.
  3. 4. Someone who posts a provocative message with the intention to begin an argument.
  4. 7. A small memory chip on a circuit board that slot into the motherboard
  5. 8. is a small computing devices that can be used for a variety of purposes.