WJEC KEY WORDS

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
Across
  1. 1. Software applications and data that are stored online and used through the Internet.
  2. 3. A type of computer program that operates a computer's hardware and provides a platform to run application programs.
  3. 4. An electronic meeting allowing users to hold face-to-face meetings without having to be in the same place physically.
  4. 6. A standard set of procedures that allow data to be transferred between electronic devices.
  5. 7. The gaining of unauthorised access to data in a computer system.
  6. 12. A type of malware that is usually disguised as legitimate software used by hackers trying to gain access to your computer system.
  7. 13. When users are tricked into making security mistakes so they give up confidential information.
  8. 16. Text files containing small pieces of data that are sent from the website you are browsing. They are stored in your computer and provide a way to recognise you and keep track of your preferences.
  9. 18. The way in which computers are arranged in a network.
  10. 19. A set of communication protocols based on a radio frequency (RF) field designed to exchange data between two electronic devices through a simple touch gesture.
  11. 22. A flying robot that can be remotely controlled.
  12. 23. Checking input to make sure it meets a set of defined rules and is sensible in order to prevent errors.
  13. 25. A computer program or computer hardware that can intercept and monitor network traffic.
  14. 26. A computer program that replicates itself in order to spread malicious code throughout your system.
  15. 29. The physical components of a computer.
  16. 35. Bullying using digital communication tools such as the Internet or mobile phones.
  17. 37. A docking point available for connection to peripherals such as input and output devices.
  18. 41. A distributed denial-of-service attack, A malicious attempt to disrupt the operation of a service or network by flooding the target with fake traffic.
  19. 42. The use of a computer program to record every keystroke made by a computer user without their knowledge and usually in order to gain fraudulent access to passwords and other confidential information.
  20. 43. Environmentally responsible and eco-friendly use of computers and their resources in order to reduce the carbon footprint.
  21. 46. The use of robots to perform tasks done traditionally by humans.
  22. 47. A program designed to help to analyse or configure or optimise or maintain a computer.
  23. 48. Software security controls put in place to manage access to computer systems (e.g. passwords).
  24. 53. A collection of text or numbers or symbols in a raw or unorganised form.
  25. 54. A technology to record the presence of an object using radio signals.
  26. 55. Smart electronic devices that are designed to be worn by the user and have sensors that collect data such as heart rate.
  27. 59. The programs that tell a computer what to do.
  28. 60. software, The process of gathering and recording and presenting information in a way that is helpful to others (e.g. in a graph).
  29. 61. The science of constructing artificial systems (e.g. limbs) that have some of the characteristics of biological systems.
  30. 62. A piece of equipment that transfers data into a computer so it can be processed.
  31. 64. A computer system that stores facts and can search these facts for information according to a set of rules and copying the decision-making ability of a human expert.
  32. 65. A private operated network where data content and access is controlled. It is insulated from the global internet.
  33. 66. A program containing a set of instructions to the computer that allows the user to carry out a specific function.
  34. 67. (LAN), Links computers that are geographically close enough together to be hard wired.
  35. 68. Protecting equipment by physically preventing access to it.
Down
  1. 2. A program designed to pass information from one system to another.
  2. 5. A controlled private network that is accessible to some authorised users outside of the organisation.
  3. 8. A piece of code which is capable of copying itself and is placed on your computer with the aim of damaging the system.
  4. 9. The process of scrambling data when it is being sent to protect it from unauthorised users as they do not have a key to decode it.
  5. 10. Technologies that recognise human body characteristics (e.g. fingerprint)to authenticate a person’s identity.
  6. 11. A telecommunications network that extends over a large geographical area connecting more than one Local Area Network (LAN).
  7. 14. A computer-generated simulation in which a person can interact within an artificial three-dimensional environment.
  8. 15. When you work at home while communicating with your office using a wide area network (WAN).
  9. 17. An online service or site that allows people to communicate with friends on the Internet using a computer or mobile phone.
  10. 20. A piece of internal or external hardware used for saving and carrying and extracting data from a computer.
  11. 21. When a person gains information such as facts or the understanding of information such as how to solve problems.
  12. 24. A wireless communication protocol for exchanging data over short distances.
  13. 27. Short for malicious software it covers all software that is specifically designed to disrupt or damage or gain unauthorised access to a computer system.
  14. 28. A copy of a file that is kept in a location away from the computer which can be used to restore data in case of loss.
  15. 30. When a user confirms their unique identity on a computer system.
  16. 31. The process of superimposing a computer-generated image on a user's view of the real world.
  17. 32. The process of converting data from one form to another.
  18. 33. A piece of equipment that receives data from your computer once it has been processed (e.g., a monitor).
  19. 34. When computers perform tasks normally requiring human intelligence such as problem solving or adapting according to previous experience.
  20. 36. Data that has been processed normally by a computer to give it meaning.
  21. 38. Checking input to make sure that the data entered is identical to the original source in order to prevent errors.
  22. 39. Commercial transactions made electronically on the Internet.
  23. 40. A type of malware that prevents you from using your computer or accessing certain files until you pay a ransom to the hacker.
  24. 44. The process of taking information from a document and converting it into data which a computer can read.
  25. 45. An industry standard method of transferring data between a host device (e.g. a computer) and a peripheral device (e.g. a mouse).
  26. 49. Making files smaller by reducing the number of bits used to store the information.
  27. 50. The data left behind when you have made an interaction online.
  28. 51. Software that is distributed with its source code so that anyone can inspect or modify or enhance it.
  29. 52. Uses a technology such as radio or microwaves to transmit signals rather than using wires or cables.
  30. 56. Electronic appliances such as mobile phones or computers and televisions that are thrown away without the intention of re-use.
  31. 57. A public worldwide system of computer networks.
  32. 58. Software that enables a user to obtain information about your computer activities by transmitting data secretly from your hard drive.
  33. 63. The most usual way of connecting computers together in a local area network (LAN).