Techology Crossword Puzzle

1234567891011121314
Across
  1. 3. Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
  2. 4. symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
  3. 6. any type of illegal activity that is undertaken (or relies heavily) on a computer.
  4. 8. a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
  5. 9. a computer that handles requests for data, email, file transfers, and other network services from other computers.
  6. 11. the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
  7. 13. unsolicited email messages sent for marketing purposes.
  8. 14. A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
Down
  1. 1. a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
  2. 2. A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
  3. 3. Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
  4. 5. refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
  5. 7. usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
  6. 10. is a device that allows computers to transmit information to each other via ordinary telephone lines.
  7. 12. a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.