Technology
Across
- 5. process of converting data into a secret code for transmission over a public network.
- 6. usually consists of eight bits.
- 7. isa plug-and-play interface that allows a computer to communicate with peripheral and other devices.
- 9. a person who posts inflammatory comments or messages in an online community such as a forum, chatroom,blog or on social networking sites.
- 10. the act of trying to access someone's information illegally.
- 12. rate at which a processor can complete a processing cycle.
Down
- 1. what is a network secruity system used to stop unauthorised access.
- 2. a device that feeds data into a computer, such as keyboard or mouse.
- 3. sending an email, posting photos on a social media site and using your webcam.
- 4. Data sent to your computer by a web server that records your actions on a certain web site
- 8. a web address.
- 11. type of text style and size.