Unit 1 Review

12345678910111213141516171819202122232425
Across
  1. 4. This invention in 1939 was a stepping stone to the first computer.
  2. 9. Messaging, commenting, or talking to someone digitally in a way that's threatening or stressful.
  3. 12. Type of device used to put information into a computer. (ex. keyboard)
  4. 13. A block of text that automatically appears at the end of an email message to provide information about the sender.
  5. 15. A machine composed of both hardware and software.
  6. 16. A set of step by step instructions that tell a computer how to perform tasks.
  7. 17. An email field that allows you to send a duplicate of an email to someone other than the primary recipient. (2 words)
  8. 18. Brin and Page founded this search engine in 1998, which has become the most popular today.
  9. 19. This type of software performs specific information processing tasks for end users.
  10. 21. This type of computer memory stores data permanently and is not lost when the machine is turned off. (3 words)
  11. 24. The Central Processing Unit is the "what" of a computer.
  12. 25. The unique record of all the online interactions associated with you and is online indefinitely is your digital _____.
Down
  1. 1. This stands for “OS.” (2 words)
  2. 2. A brief summary of the email's content used to tell the email's purpose and encourage the receiver to open and read.(2 words)
  3. 3. Messages distributed by electronic means from one computer user to one or more recipients via a network.
  4. 5. The keyboard replaced these in 1947 for users to become more efficient when entering information. (2 words)
  5. 6. The recommended length of characters for a secure password.
  6. 7. The creation of this was made to pass information around the world in a matter of seconds. (3 words)
  7. 8. Software designed to gain unauthorized access to and disrupt or damage a computer system.
  8. 10. This type of computer memory is temporary, meaning the data is lost when the machine is turned off. (3 words)
  9. 11. The physical pieces of a computer.
  10. 14. A malicious software that blocks access to a phone or computer system until a sum of money is paid.
  11. 20. A type of cyberbullying that focuses on attempting to start arguments online.
  12. 22. Type of device used to see the results of a computer's manipulation of the data input. (ex. printer)
  13. 23. This makes a computer so fast.