Mauricio Guerrero
Across
- 5. Malware is a general term for all such programs - it simply mean software, of whatever sort, written with a malicious intent.
- 6. A programming language.
- 8. A byte is a collection of eight bits, so called because if the pun with bit and bite.
- 11. Browser A program you use to look at, and navigate between, pages on the World Wide WEb.
- 12. Disk Space- is a more permanent store that holds files even when the computer is switched off.
- 13. A reboot requires that all software is completely reloaded.
- 14. Spyware is software that secretly monitors computer activity, attempting to gain private information without the computer user knowing.
- 16. Unsolicited email messages sent out in bulk and generally commercial in nature.
- 18. Bandwidth is an indication of how quickly data travels along a connection.
Down
- 1. A small text file sent to your computer by a web site you have visited.
- 2. The word modem was originally coined in the days when computers communicated by converting numbers into sounds that could then be transmitted over a regular telephone line.
- 3. CAPTCHA checks are the strings of letters and numbers that have to be typed in on some web pages before something can be saved.
- 4. is a rather vague term that refers to bandwidth somewhere above that of an old dial-up modem.
- 7. A virus is a piece of software that can copy itself and which attaches itself to some other program in order to survive and replicate.
- 9. A firewall is a piece of computer software or hardware that restricts the data that is allowed to flow through.
- 10. Bits is the smallest unit data of a computer.
- 11. A worm is similar but it can exist independently: it doesn’t need to attach to separate program.
- 15. Wide Web The World Wide Web System that operates via this writing. Web pages are transmitted via internet connections but there is more to the internet than just the web.
- 17. Unix command that provides information about users logging into a system.
- 19. is a piece of software that gains access to a computer by pretending to be benign or by hiding within some innocent-looking applications.