DDL

123456789101112131415161718192021222324252627282930
Across
  1. 2. Devices – Components such as monitors, speakers, or printers that display or produce results from a computer.
  2. 4. – The process of encoding data to prevent unauthorized access.
  3. 8. – A computer that stores and provides online content.
  4. 11. Drive (HDD) / Solid-State Drive (SSD) – Storage devices where files, programs, and the operating system are kept.
  5. 13. System (OS) – The main software that manages hardware and other programs, like Windows, macOS, or Linux.
  6. 15. Devices – Equipment like a mouse, keyboard, or touchscreen used to enter data into a computer.
  7. 17. (Random Access Memory) – Temporary memory that stores data for quick access while the computer is running.
  8. 19. – An input device used for typing commands and text.
  9. 22. – Wireless internet connection.
  10. 24. – A security system that monitors and controls incoming and outgoing network traffic.
  11. 25. – The ability to save and retain data, including hard drives, SSDs, and flash drives.
  12. 27. – The main circuit board that connects all hardware components.
  13. 28. – An electronic device that processes data and performs tasks based on user input.
  14. 30. – A collection of web pages accessible online.
Down
  1. 1. – A file sent along with an email, like a document or image
  2. 3. – A cyberattack method where scammers trick users into revealing sensitive
  3. 5. – A program used to navigate the internet, like Chrome or Edge.
  4. 6. – Sending data from your device to the internet.
  5. 7. (CPU) – The brain of the computer that performs calculations and executes tasks.
  6. 9. – The programs and operating systems that allow a computer to function and perform tasks.
  7. 10. – The physical components of a computer, such as the monitor, keyboard, and processor.
  8. 12. – Transferring data from the internet to your device.
  9. 14. – Unwanted or junk emails, often advertisements.
  10. 16. – The web address used to access a site.
  11. 18. - Hacking refers to gaining unauthorized access to a computer system or network.
  12. 20. (App) – A program designed for specific tasks, such as web browsing, editing, or gaming.
  13. 21. – A display screen that visually presents information from the computer
  14. 23. – The main folder where received emails are stored.
  15. 26. Supply Unit (PSU) – Converts electricity into usable power for the computer's components.
  16. 29. – Connection points for external devices like USB drives, headphones, and monitors.