Telecoms
Across
- 4. Serial Advanced Technology Attachment.
- 8. volatile memory, stores data regarding frequently accessed programs and processes.(ram)
- 11. touch panel that allows you to control a cursor or facilitate navigation through a menu or any graphical interface.
- 13. manipulate websites to obtain confidential or private information.
- 14. virus that seems harmless but when installed allows remote access to the infected pc from the attacker.
- 15. The visual presentation on the indicating device of an instrument.
- 16. recordable compact disc (contain a - )
- 19. the attacker will pose as a fictitious person to try to steal private information.
- 20. reduction of the volume of data that can be processed to represent certain information using less space.
- 21. is a printed circuit board to which the components that make up the computer are connected.
Down
- 1. Malicious program or code that is harmful to systems.
- 2. device that based on stitches and keys allows us to enter information in our pc, to write.
- 3. Frames per second.
- 5. it is a way to be able to save data of the same type or class.
- 6. input peripheral consisting of a lever that rotates on a base and reports its angle or direction to the device it is controlling.
- 7. Redundant Array of Independent Disks.
- 9. problem that won't allow the system to start.
- 10. It is an input device to enter orders to the computer, it is usually designed with two buttons.
- 12. this object often called the "brain" of a computer, thanks to its direct plug connection to the motherboard, and communication with all of the computer’s other components.(cpu)
- 17. Malicious software that infects your computer or mobile device and collects information about you, your browsing.
- 18. It works like an electroacoustic sensor or transducer and converts sound into an electrical signal to increase its intensity, transmit it and record it.