Technology
Across
- 1. The computing part of the computer. Also called the "processor," it is made up of the control unit and ALU.
- 3. it is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords. Also known as "brand spoofing," an official-looking e-mail is sent to potential victims pretending to be from their bank or retail establishment.
- 9. Instructions for the computer. A series of instructions that performs a particular task is called a "program." The two major software categories are "system ________" and "application ________."
- 10. An inhouse website that serves employees only, and most medium-sized and large companies have one. Although intranet pages may have links to websites on the Internet, the _________ is not exposed to, or is accessed by, the general public.
- 11. Computer people may use the term for capability and time. For example, "not enough _______ to get the job done" means not enough staff or time to do it.
- 12. A small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk. ________ provide a way for the website to recognize you and keep track of your preferences.
- 13. The address that defines the route to a file on an Internet server (Web server, mail server, etc.). ___s are typed into a Web browser to access Web pages and files.
Down
- 1. Reserved areas of memory in every computer that are used to speed up instruction execution, data retrieval and data updating.
- 2. An organization that provides access to the Internet. Connection to the user is typically via DSL, cable or FiOS; however, ____ can deliver service via satellite, dial-up, ISDN, private lines and wireless.
- 4. a global network made up of smaller networks
- 5. The fundamental display element of an electronic screen or bitmapped image.
- 6. To write and post an entry in a website called a weblog
- 7. Machinery and equipment (CPUs, drives, keyboards, printers, scanners, cables, etc.). In operation, a computer is both ________ and software, and one is useless without the other.
- 8. The primary method for keeping a computer secure from intruders. A ______ allows or blocks traffic into and out of a private network or the user's computer. _____ are widely used to give users secure access to the Internet as well as to separate a company's public Web server from its internal network.
- 13. The most widely used hardware interface for attaching peripherals to a computer. There are at least two ____ ports on laptops and four on desktop computers