Across
- 5. read-only memory Permanently installed memory on your computer attached to the motherboard. The ROM chip contains the BIOS, which tells your computer how to start.
- 6. Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
- 7. A wireless data network technology that provides high-speed data connections that do not require a physical connection. It is used for mobile devices.
- 8. To copy or use someone else’s work and claim it as your own.
- 9. Short for “application,” a computer program that performs specific tasks; also called a program.
- 14. Memory that loses its contents when power is removed.
- 15. The most common storage medium on a computer; can be magnetic or solid state.
- 16. Business transactions that occur over an electronic network such as the Internet.
- 19. A practice that involves reducing electricity consumed and environmental waste generated when using computers, mobile devices, and related technologies.
- 21. A collection of related worksheets contained within a single file.
- 23. Information processed into a useful form such as text, graphics, audio, video, or any combination of these.
- 25. A three- or four-letter sequence, preceded by a period, at the end of a filename that identifies the file as a particular type of document, such as .docx or .xlsx.
- 26. Apps like Amazon’s Alexa or Apple’s Siri that use natural language processing to respond to your verbal commands or questions, using search technology to provide answers or perform a task, such as adding an item to a grocery list,
- 29. The manner in which a slide appears on the screen in place of the previous slide during a slide show.
Down
- 1. In Computer Concepts, a device used to point to and select specific objects on the computer screen. Examples of point devices include a mouse, touchpad, and trackball.
- 2. A device that protects computer equipment by absorbing electrical spikes, surges, or noise before they can reach the equipment.
- 3. Law that requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers. Americans with Disabilities Act
- 4. Similar to a desktop computer, but the monitor and system unit are housed together.
- 6. A grid of cells that contain numbers and text; in Microsoft Excel, a spreadsheet is called a worksheet.
- 10. A collection of data organized in a manner that allows access, retrieval, and use of that data.
- 11. A global collection of millions of computers linked together to share information.
- 12. The use of computers to simulate a real or imagined environment that appears as a three-dimensional (3-D) space. Virtual Reality
- 13. The technological use of logic and prior experience to simulate human intelligence. Artificial Intelligence
- 17. A storage area located on a server that you access through the Internet or a network.
- 18. A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie.
- 20. A complex integrated circuit that consists of millions of electronic parts and is primarily responsible for converting input (data) into meaningful output (information). Central Processing Unit
- 22. A grid of square colored dots, called pixels, that form a picture; also, a file containing a graphic that consists of a bitmap.
- 24. In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
- 27. Any data and instructions entered into the memory of a device.
- 28. Using someone’s personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.
