Information Technology

123456789101112131415161718192021222324252627282930
Across
  1. 3. a person who exploits computer hardware and software for their own purposes
  2. 6. to modify or arrange something so that it works in a certain way
  3. 7. to create a duplicate copy of data that is stored on a separate hard drive or computer system to prevent the loss of the data
  4. 8. a personal website maintained by an individual
  5. 10. a computer virus that copies its code over and destroys the files of the original data
  6. 12. a set of rules that must be followed for the sake of security
  7. 13. a filter that prevents harmful software from entering a network
  8. 15. a small application that is embedded in a webpage
  9. 20. to make copies
  10. 22. to make sure that it is legitimate
  11. 24. a piece of code that is used to fix a flaw in a computer program
  12. 25. any type of media used on a webpage, including images and videos
  13. 26. the proces of stealing another person’s information and using it for personal gain
  14. 28. how users communicate with a computer
  15. 29. the use of the internet for software and other resources
  16. 30. a collection of icons or pictures that have been organized in a file or page
Down
  1. 1. changing computer to your needs
  2. 2. a measurement of how quickly a computer works
  3. 4. device that converts mechanical information into electronic signals
  4. 5. the company that produces Macs and other computing products
  5. 9. a software that keeps a computer safe from threats such as computer viruses and cyber crimes
  6. 11. tricking people into giving information through email
  7. 14. to work at a location away from a main office by using technology
  8. 16. a word or phrase that makes a computer perform an operation
  9. 17. a person who uses computers and the internet to commit crimes
  10. 18. a filter that prevents harmful softaware from leaving a network
  11. 19. a computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event
  12. 21. using a legitimate-looking website to trick people
  13. 23. a program that restricts access on a network
  14. 27. an action that results in the loss of another person’s property