NOCTI 3

1234567891011121314151617
Across
  1. 2. a program that is designed to copy itself onto other software and to spread through multiple computers when the software is used is called a what
  2. 4. to resize a chart in a spreadsheet, the user can drag the what of the chart
  3. 5. in additions to detecting viruses and inoculating against them what programs can repair infected programs and files
  4. 7. an efficient way to complete 500 customers' personal invitations would be to create a what
  5. 9. which chart or graph best shows the relationship of a part to a whole
  6. 11. to balance the text in columns, insert a what section break
  7. 13. the y-axis scale on 3-D chart is derived from what in the worksheet
  8. 15. some employees have limited access to company information. this security is called what
  9. 17. to create a heading to span across two or more columns, the user should what
Down
  1. 1. a what restricts the information traveling into and out of a computer
  2. 3. a computer that has malicious software installed on it that can be controlled by a master computer is called a what
  3. 6. text design, such as drop capitals and graphics embedded with watermarks, are both forms of what when using desktop publishing
  4. 8. preset margins, tabs, line spacing, and fonts are called what settings
  5. 10. a what is a device that makes decisions about what network path packets should follow
  6. 12. to reverse an action or its effect in a spreadsheet, the user should select the what command
  7. 14. a company that want to tie various remote locations together would implement a what
  8. 16. the wireless encryption of what is the weakest encryption used