Across
- 7. signal that is used to represent data as a sequence of discrete values
- 10. Most common format for text files in computers and on the Internet
- 11. relating to our using signal is represented by a continuously variable physical quantity
- 12. authority: a trusted entity that manages and issues security certificates and public keys used for secure communication in a public network
- 13. list of items that are granted access to a certain system or protocol
- 14. to store data and perform calculations using only zeros and ones
- 20. the use of dedicated websites and applications to interact with other users
- 21. the place an active program is running but is not visible to the user
- 24. Digital rights management is a systematic approach to copyright protection for digital media
- 26. describes how, when and by whom a particular set of data was collected and how data is formed
- 27. a unit of information equal to 1 million bytes
- 28. Term used to describe unsightly debris that occurs due to digital living
- 31. state of being protected against criminal or unauthorized use of electronic data
- 34. the address of the world wide web page
- 36. the observation that the number of transistors in a dense, integrated circuit doubles approximately every two years
- 37. forwarding by a router of a packet from any node to every other node attached to the router
- 38. A small amount of data sent over a network which includes a source and destination
- 39. event data recorder’s capture information for analysis or better understanding of an event
- 41. hypertext markup language is standard text based computer language for creating electronic documents for the web or offline uses
- 43. smallest unit of data in a computer
- 45. a list of email addresses or domains of known spammers which are considered dangerous
- 49. Dynamic random-access memory is a type of random access semiconductor memory that stores each bit of data in a separate tiny capacitator within an integrated circuit
- 51. Trusted platform module is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication
- 52. quantities, characters or symbols on which operations are performed by a computer
- 53. a group or system of interconnected people or things
- 56. term referring to creations of the intellect for which a monopoly is assigned to designated owners by law
- 57. a device that allows a computer to read data and/or write data to a disk
- 58. request for information from a database
- 61. Discreet online resource that is collaboratively developed and managed by a community
- 62. the process of converting information or data into a code, especially to prevent unauthorized access
- 64. describes the method of converting data for storage or transmission
- 65. to copy data from one computer system to another, typically over the Internet
- 66. the process of examining large databases in order to generate new information
- 67. the art of writing or solving codes
- 69. enterprise data storage entity in which data has been specifically partitioned for an analytical or reporting purpose
- 70. the online world of computer networks and especially the Internet
- 71. something that is created dynamically according to the needs of the data user
- 74. an instance of a program running in a computer which is started when the program is initiated
- 75. primary location from where data, such as a database, data set or spreadsheet
Down
- 1. Collection of documents about a person, event or subject
- 2. expressed as a series of zero and one, typically represented by values of a physical quantity
- 3. Algorithm for performing encryption or decryption - a series of steps that can be followed as a procedure - which converts plain text into a coded set of data
- 4. the practice of using a network of remote servers hosted on the Internet to store, manage and process data
- 5. Central location in which data is stored and managed
- 6. a minute area of illumination on a display screen, one of many from which an image is come
- 8. system that transfers data between network access points known as nodes through data switching, system control and interconnection transmission lines
- 9. a rectangular pattern of parallel scanning lines followed by the electron beams on a TV screen or computer monitor
- 15. any letter, number, punctuation mark or symbol that can be typed
- 16. well-defined procedure that allows computers to solve a problem
- 17. any process in which information is gathered and expressed in a summary form
- 18. use of interactive, sensory representations of abstract data to reinforce cognition, hypothesis building and reasons
- 19. An automated program that runs over the Internet - a computer program that executes a specific task according to the users instructions
- 22. a large group of network computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data
- 23. radio frequency identification is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum
- 25. Collection of hardware and software needed to have a working system
- 29. a unit of graphic solution equivalent to 1 million pixels
- 30. an identifier for devices on the TCP/IP network
- 32. A class of data compression algorithms that allows original data to be perfectly reconstructed from compressed data
- 33. encryption standard developed by IBM - data encryption standard is a block cipher thus applying cryptographic key and algorithms to a block of data rather than one bit at a time
- 35. reduces a file by permanently eliminating certain information
- 40. a unit of information equal to 1 billion bytes
- 42. process of taking encoded text or other data and converting it back to a text that you or the computer can read and understand
- 44. into relationship among data elements that determine how data is recorded, manipulated, stored and presented in a database
- 46. A type of computing architecture where all or most of the processing is performed on a central server
- 47. computer program that analyzes data in order to translate it to a form acceptable to the computer
- 48. any computing hardware that is used for storing, porting and extracting data files
- 50. the process of representing a real world object or phenomenon as a set of mathematical equations
- 54. software used to organize and analyze data
- 55. process of generating an image from a model using computer programs
- 59. Part of a computer system that is designed to block unauthorized access while permitting outward communication
- 60. practice of sending unwanted email messages, frequently with commercial content
- 63. contains the applications the user is working on - a priority assigned to programs running in a multitasking environment
- 68. To store data locally in order to speed up subsequent retrievals
- 72. recognition of printed or written text characters by a computer - optical character recognition
- 73. Advanced encryption standard is a symmetric block cipher to protect classified information and is implemented in software and hardware to encrypt sensitive data