Theory Revision

12345678910111213141516171819202122232425262728293031323334
Across
  1. 1. Is a technology that automatically provides users with updated content from many different sites (abbreviation)
  2. 4. Device that connects computers in a network with cables, to enable communication between them (but not used for internet access)
  3. 6. Allows you to control which programs can access the internet; protects your computer or network from unauthorised access
  4. 7. An upgrade on WiFi and a more secure wireless networking technology that allows wireless devices to communicate with one another
  5. 9. Includes the spreading of rumours, gossip and the general bullying of another person using digital communication methods (2 words)
  6. 11. A place where a WiFi network has been created so that people can connect to the network
  7. 13. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  8. 16. Getting the latest 'bug fixes' or obtaining new features
  9. 19. Where computer resources are used without permission, or for tasks not authorised by the owner of the computer (2 words)
  10. 20. Connecting to your bank via the internet to perform online transactions (2 words)
  11. 21. A wireless networking technology using radio waves to provide internet access
  12. 22. A type of cabling that transmits data as pulses of light through thin strands of glass or plastic
  13. 24. Generally, the minimum hardware requirements needed to run the software (2 words)
  14. 28. Online publishing tools
  15. 30. Any type of business transaction that involves communication across the internet
  16. 31. Any online environment that allows people to 'chat' in real time (2 words)
  17. 32. 'Free' software that is ad-sponsored and pops up adverts while the program is running
  18. 33. Error in the program caused by the way it was written (2 words)
  19. 34. Allows two or more people to hold online conferences at different locations (2 words)
Down
  1. 2. where likes, dislikes, interests, photographs, etc. can be posted for friends to see and read (3 words)
  2. 3. The use of deception to manipulate or 'con' someone into giving out confidential information (such as a password or account number) or into giving access to their computer or premises (2 words)
  3. 4. Usually relate to the type of operating system, e.g. Linux or macOS versus Windows, and the version needed (2 words)
  4. 5. Refers to centralising and automating or 'computerising' all tasks and systems in the office (2 words)
  5. 8. Connects computer to a cabled network, allows computer to communicate with the network
  6. 10. Network which connects computers in a small area such as a school
  7. 12. Any technique or software that tries to monitor and track the way you use your computer, and then report this information to a third party
  8. 14. Software that runs on internet servers - interface viewed in web browser (2 words)
  9. 15. Is usually carried out by an individual who is obsessed with someone (2 words)
  10. 17. outlines rights and responsibilities of network users (abbreviation)
  11. 18. Web-based word processor, presentation and spreadsheet applications (2 words)
  12. 19. Computing devices that use network resources
  13. 20. Organisation's private network (abbreviation)
  14. 23. The protocol (rule for communication) used for the fast, easy transfer of files between remote computers that have an internet connection (abbreviation)
  15. 25. Cable that is easy and cheap to install (abbreviation)
  16. 26. A type of malware that encrypts your files or locks your device, making them inaccessible until a ransom is paid to the attacker (2 words)
  17. 27. Powerful computers that provide resources
  18. 29. A technology that allows telephone calls to be made over LANs, WANs and the internet (abbreviation)