Jasmine's Tech Dictionary

123456789101112131415161718192021222324252627282930313233343536
Across
  1. 3. A storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
  2. 6. An operating system is a software that withholds and manages a computer’s hardware, resources, basic functions, appling applications and controlling peripherals
  3. 12. used as a mini storage device for your files on your pc and other stuff or as a cable (mostly just the part of the cable that you plug into the computer).
  4. 13. the cloud is the data basis and they are all over the world. The cloud can save companies monA search engine is a system that is designed to carry out web searchesey and add convince for users
  5. 14. part of a computer that in which operations are controlled and executed
  6. 16. is what you type in to get to a website
  7. 17. is a type of laptoptypes; including Acer, Lenovo, Samsung Galaxy, and Google Pixel.
  8. 18. is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets
  9. 19. simply modem is a device that is planted in your home that takes encrypted data from your Internet Service provider and translates the signals so your Router can provide internet for your devices
  10. 20. A computer that can only be used at a desk
  11. 21. is essentially a computer's form of memory
  12. 24. It process, stores, and utilizes data
  13. 27. A global computer network providing a variety of information and communication facilities
  14. 28. a unique digital identifier that cannot be copied, substituted
  15. 29. wireless internet
  16. 30. a person who has knowledge + skills to use digital technologies to communicate with other peers around them.
  17. 31. a computer that can be easily moved around and is small
  18. 35. is an auxiliary device used to put information into and get information out of a computer
  19. 36. Is two or more computers connected and powering data through one another
Down
  1. 1. sitting posture
  2. 2. can spread to one and another and there one going on
  3. 3. this includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage
  4. 4. it refers to an individual's ability to find, evaluate, and clearly communicate information through typing and other media on various digital platforms. It is evaluated by an individual's grammar, composition, typing skills and ability to produce text, images, audio and designs using technology.
  5. 5. Basic unit of computer storage and processing
  6. 7. a panel of keys that operate a computer
  7. 8. is a bunch of network sources that connect through different devices
  8. 9. is a mobile device that has the same smarts as a computer. The difference is that the smart phones are much smaller and have more privacy policies
  9. 10. a software tells a computer what do do and where to go
  10. 11. can search things up
  11. 13. Use this to make it harder for others to get into your account.
  12. 15. is a little block of data created by a web server while the user of the device is looking at a website and are used to store websites information and to track a users activity on a computer
  13. 22. online journal or informational website showing the newest posts first
  14. 23. a digital record of the time when something happened
  15. 25. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity
  16. 26. This is when you open one of those emails or texts like to watch some video and then all your stuff gets stolen like passwords, credit/debit card numbers, and a bunch of other stuff
  17. 32. pretend to be someone that you aren’t on the internet
  18. 33. a quotation from or reference to a book, paper, or author
  19. 34. s a Network Security Device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules