Shelby County Government Information Technology Services
Across
- 2. A name that identifies a wireless network.
- 4. Any software that covertly gathers user information, usually for advertising purposes, through the user's Internet connection.
- 7. A set of rules that regulate how computers exchange information.
- 11. Physical components of a computer including the keyboard, monitor, disk drive, etc.
- 13. Group/Team that uses code to create software and websites.
- 16. A name used in conjunction with a password to gain access to a computer system or a network service.
- 17. A group of interconnected computers capable of exchanging information.
- 19. A computer that is responsible for responding to requests made by a client program.
- 20. A device used for connecting two Local Area Networks (LANs).
- 24. Allows wireless-equipped computers and other devices to communicate with a wired network.
- 26. Any program that performs a specific function. Examples: word processing, spreadsheet calculations, or electronic mail.
- 27. A con that scammers use to electronically collect personal information from unsuspecting users.
- 28. A combination of keyboard characters meant to represent a facial expression.
- 29. Group that provides the framework for all services.
- 30. Information and assistance resource that troubleshoots problems with computers or similar products.
Down
- 1. The best school in Shelby County.
- 3. A collection of information organized so that a computer application can quickly access selected information.
- 5. Office that supports and manages projects.
- 6. A general purpose programming language commonly used in conjunction with web pages that feature animation.
- 8. A facility used to house computer systems and associated components.
- 9. Group that ensures the safety of the environment and data.
- 10. Group that is the first line of service with the customer.
- 12. Junk email or unsolicited bulk email.
- 14. Process of identifying yourself and the verification that you're who you say you are.
- 15. A secret combination of characters used to access a secured resource.
- 18. Hardware and/or software method of preventing unauthorized access to or from a particular network.
- 21. Manipulation of data to prevent accurate interpretation by all but those for whom the data is intended.
- 22. Wireless networking technology via radio waves.
- 23. Real-time communication between two or more users via networked-connected computers.
- 25. Mayor of Shelby County.