WJEC KEY WORDS
Across
- 1. Software applications and data that are stored online and used through the Internet.
- 3. A type of computer program that operates a computer's hardware and provides a platform to run application programs.
- 4. An electronic meeting allowing users to hold face-to-face meetings without having to be in the same place physically.
- 6. A standard set of procedures that allow data to be transferred between electronic devices.
- 7. The gaining of unauthorised access to data in a computer system.
- 12. A type of malware that is usually disguised as legitimate software used by hackers trying to gain access to your computer system.
- 13. When users are tricked into making security mistakes so they give up confidential information.
- 16. Text files containing small pieces of data that are sent from the website you are browsing. They are stored in your computer and provide a way to recognise you and keep track of your preferences.
- 18. The way in which computers are arranged in a network.
- 19. A set of communication protocols based on a radio frequency (RF) field designed to exchange data between two electronic devices through a simple touch gesture.
- 22. A flying robot that can be remotely controlled.
- 23. Checking input to make sure it meets a set of defined rules and is sensible in order to prevent errors.
- 25. A computer program or computer hardware that can intercept and monitor network traffic.
- 26. A computer program that replicates itself in order to spread malicious code throughout your system.
- 29. The physical components of a computer.
- 35. Bullying using digital communication tools such as the Internet or mobile phones.
- 37. A docking point available for connection to peripherals such as input and output devices.
- 41. A distributed denial-of-service attack, A malicious attempt to disrupt the operation of a service or network by flooding the target with fake traffic.
- 42. The use of a computer program to record every keystroke made by a computer user without their knowledge and usually in order to gain fraudulent access to passwords and other confidential information.
- 43. Environmentally responsible and eco-friendly use of computers and their resources in order to reduce the carbon footprint.
- 46. The use of robots to perform tasks done traditionally by humans.
- 47. A program designed to help to analyse or configure or optimise or maintain a computer.
- 48. Software security controls put in place to manage access to computer systems (e.g. passwords).
- 53. A collection of text or numbers or symbols in a raw or unorganised form.
- 54. A technology to record the presence of an object using radio signals.
- 55. Smart electronic devices that are designed to be worn by the user and have sensors that collect data such as heart rate.
- 59. The programs that tell a computer what to do.
- 60. software, The process of gathering and recording and presenting information in a way that is helpful to others (e.g. in a graph).
- 61. The science of constructing artificial systems (e.g. limbs) that have some of the characteristics of biological systems.
- 62. A piece of equipment that transfers data into a computer so it can be processed.
- 64. A computer system that stores facts and can search these facts for information according to a set of rules and copying the decision-making ability of a human expert.
- 65. A private operated network where data content and access is controlled. It is insulated from the global internet.
- 66. A program containing a set of instructions to the computer that allows the user to carry out a specific function.
- 67. (LAN), Links computers that are geographically close enough together to be hard wired.
- 68. Protecting equipment by physically preventing access to it.
Down
- 2. A program designed to pass information from one system to another.
- 5. A controlled private network that is accessible to some authorised users outside of the organisation.
- 8. A piece of code which is capable of copying itself and is placed on your computer with the aim of damaging the system.
- 9. The process of scrambling data when it is being sent to protect it from unauthorised users as they do not have a key to decode it.
- 10. Technologies that recognise human body characteristics (e.g. fingerprint)to authenticate a person’s identity.
- 11. A telecommunications network that extends over a large geographical area connecting more than one Local Area Network (LAN).
- 14. A computer-generated simulation in which a person can interact within an artificial three-dimensional environment.
- 15. When you work at home while communicating with your office using a wide area network (WAN).
- 17. An online service or site that allows people to communicate with friends on the Internet using a computer or mobile phone.
- 20. A piece of internal or external hardware used for saving and carrying and extracting data from a computer.
- 21. When a person gains information such as facts or the understanding of information such as how to solve problems.
- 24. A wireless communication protocol for exchanging data over short distances.
- 27. Short for malicious software it covers all software that is specifically designed to disrupt or damage or gain unauthorised access to a computer system.
- 28. A copy of a file that is kept in a location away from the computer which can be used to restore data in case of loss.
- 30. When a user confirms their unique identity on a computer system.
- 31. The process of superimposing a computer-generated image on a user's view of the real world.
- 32. The process of converting data from one form to another.
- 33. A piece of equipment that receives data from your computer once it has been processed (e.g., a monitor).
- 34. When computers perform tasks normally requiring human intelligence such as problem solving or adapting according to previous experience.
- 36. Data that has been processed normally by a computer to give it meaning.
- 38. Checking input to make sure that the data entered is identical to the original source in order to prevent errors.
- 39. Commercial transactions made electronically on the Internet.
- 40. A type of malware that prevents you from using your computer or accessing certain files until you pay a ransom to the hacker.
- 44. The process of taking information from a document and converting it into data which a computer can read.
- 45. An industry standard method of transferring data between a host device (e.g. a computer) and a peripheral device (e.g. a mouse).
- 49. Making files smaller by reducing the number of bits used to store the information.
- 50. The data left behind when you have made an interaction online.
- 51. Software that is distributed with its source code so that anyone can inspect or modify or enhance it.
- 52. Uses a technology such as radio or microwaves to transmit signals rather than using wires or cables.
- 56. Electronic appliances such as mobile phones or computers and televisions that are thrown away without the intention of re-use.
- 57. A public worldwide system of computer networks.
- 58. Software that enables a user to obtain information about your computer activities by transmitting data secretly from your hard drive.
- 63. The most usual way of connecting computers together in a local area network (LAN).