Vocab Crossword

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 2. _______ computing is a computing infrastructure in which resources, such as storage and applications, are hosted in a distributed fashion by a third party over the Internet.
  2. 3. An OS that is an open-standards UNIX derivative originally developed and released by a Finnish computer science student named Linus Torvalds.
  3. 5. _____Bar is a File Explorer component that is located below the ribbon and displays the address of an object.
  4. 7. A text file that is created by a website and placed on a computer's hard drive to store information that is used to identify users as well as to prepare customized web pages for them.
  5. 8. A complete computer system that is small, compact, lightweight, and portable.
  6. 10. A laptop computer that comes pre-installed with the Chrome OS.
  7. 12. ___________ computer is a computer that has the monitor and the computing components all built into one physical device.
  8. 16. _____ storage is any storage media that is directly attached to the computer that uses it.
  9. 19. Any message containing incorrect or misleading information that is disseminated to multiple users through unofficial channels.
  10. 20. a computer.
  11. 21. An object that stores information on a computer.
  12. 22. Specialized software that is stored on a hardware device's read-only memory (ROM) whether or not the device is powered.
  13. 24. _________ technology are tools that are designed to ensure that people with disabilities are able to use software applications.
  14. 27. A ventilation component that cools the internal components of a computer.
  15. 29. The personal computer component that acts as the backbone for the entire computer system. Also referred to as a system board.
  16. 33. The smallest unit of information in a computer system.
  17. 34. The process of converting data into a form that is not easily recognized or understood by anyone who is not authorized to access the data.
  18. 35. A digital display standard that aims to replace the DVI and VGA standards.
  19. 36. Specialized software that controls a device attached
  20. 37. A container object that can store your files in an organized manner. Often referred to as a folder.
  21. 38. A user who excels at programming or managing and configuring computer systems, and has the skills to gain access to computer systems through unauthorized or unapproved means.
Down
  1. 1. A wireless technology that facilitates short- range wireless communication between devices.
  2. 4. CPUs mounted in a single chip, working in parallel.
  3. 6. _____ reader A device used to read electronic books, or eBooks.
  4. 7. (central processing unit) A computer chip where most of the computing calculations take place. Also referred to as the microprocessor or processor.
  5. 9. ______ mode is a mobile device setting that you can use to quickly disconnect the mobile device from Wi-Fi and cellular connections, as well as disable the ability to send and receive calls, email, and text messages.
  6. 11. ______ processor is a central processing unit (CPU) that has two or more
  7. 13. A set of networking technologies and media access methods specified for LANs.
  8. 14. ______ player is a handheld device that enables you to play digitally recorded audio, video, and combination audio/video files.
  9. 15. A unit of computer storage equal to approximately one character.
  10. 17. Malicious code that enters the computer system
  11. 18. _____ drive is a solid state storage device that typically connects to a USB port on your computer.
  12. 23. ______ pane is a File Explorer component that displays a list of files and subfolders within a folder.
  13. 25. The use of assistive technology to make computers available and easier to use.
  14. 26. A container object that can store your files in an organized manner. Also referred to as a directory
  15. 28. ____ app is a compact software program that is developed to perform a predefined function on a smartphone or a handheld mobile device such as a mobile phone, tablet, or feature phone.
  16. 30. ____ force attack is a password attack in which the attacker uses password cracking software to attempt every possible alphanumeric password combination.
  17. 31. ______ applications are software programs that are sold together as a set or suite, or that are sold with an operating system or with a new computer.
  18. 32. (cathode ray tube) A type of display device that uses electron beams within a vacuum tube to create images on a fluorescent screen.
  19. 37. _____backup is a type of information protection scheme that enables you to store copies of critical files and folders on another medium for safekeeping.