ICT Revision
Across
- 2. (Universal Serial Bus) A standard method of connecting devices such as keyboards and printers to a computer.
- 4. computer Designed to allow the user to use the computer on the move, e.g. laptop, notebook, netbook and PDA.
- 7. (Internet Protocol) address The personal address of your computer (just like your home address), so that servers know where to send the information you have requested.
- 9. A set of rules used by computers to communicate with each other across a network. Without protocols, computers would not be able to communicate effectively.
- 10. A combination of different content types such as text, audio, still images, animation and video.
- 11. To attach the exact geographical coordinates of longitude and latitude to a digital image, giving the location of where it was taken.
- 12. test Asks users to carry out a set of instructions using a given product.
- 13. An effect caused by displaying a bitmap or a section of a bitmap at such a large size that individual pixels (small single-coloured squares that the image is made of) are visible to the eye.
- 15. Buying and selling goods electronically, usually over the Internet.
- 17. A system designed to prevent unauthorised access to your computer when connected to a network such as the Internet.
- 19. Unwanted or junk email sent to lots of recipients at the same time.
- 20. Devices connected together to allow communication and exchange of data.
- 21. A formula used in a calculation, such as IF or SUM.
- 23. (electronic card) A digital greetings card or postcard created and sent to someone via the Web.
Down
- 1. forum An online message board where people can share their ideas and views.
- 3. Software that can be installed on your computer without your knowledge, which collects information about your logins and passwords and sends details to another computer on the Internet.
- 4. A form of Internet fraud that aims to steal valuable information such as credit card details, usernames and passwords.
- 5. A program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive. A trojan is similar to a virus except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game.
- 6. The time delay between the moment something is initiated and the moment it becomes detectable.
- 8. Copying someone else's work and presenting it as your own.
- 10. Having the ability to do many different things using the same device.
- 14. database A database that uses more than one table. Tables are linked together by common data items, such as ID number, known as keys.
- 16. Software that is designed to cause problems for users.
- 18. Programs that give instructions to a computer and which allow the user to carry out different tasks.
- 21. Tricking someone for personal gain or to damage them.
- 22. (high-definition multimedia interface) Required for connecting devices to show high-definition video.