Brandon's Tech Dictionary Crossword Puzzle

123456789101112131415161718192021222324
Across
  1. 2. A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  2. 3. The knowledge, skills, and attitudes that present children with the opportunity to be safe and empowered while using digital applications
  3. 6. A web browser is an application for accessing websites
  4. 7. A structured set of data held in a computer, especially one that is accessible in various ways
  5. 13. To give credit for the original source of information
  6. 15. A peripheral device that enables a user to input text into a computer or any other electronic machinery
  7. 16. Any electronic device that manipulates information or data
  8. 17. A modem is a hardware which connects to a computer, broadband network or wireless router
  9. 20. A security system that requires two separate, distinct forms of identification in order to access something
  10. 22. A convenient computer that is more useful and is almost as powerful as a desktop computer
  11. 23. A global computer network providing a variety of information and communication facilities
  12. 24. Any internal or external equipment or devices you can use perform major functions
Down
  1. 1. A device that can be used to store computer data
  2. 4. A device that forwards data packets to the appropriate parts of a computer network
  3. 5. A set of instructions, data or programs used to operate computers and execute specific tasks
  4. 7. When someone uses the internet in a safe and legal way
  5. 8. A wireless networking technology that uses radio waves to provide wireless high-speed Internet access
  6. 9. An output device that displays information in pictorial or textual form
  7. 10. A video camera that is connected to a device and allows videos and images to be online
  8. 11. A new type of computer designed to help you get things done faster and easier
  9. 12. Where the data is stored that your computer processor needs to run your applications and open your files
  10. 14. A sequence of characters or encoded information identifying when a certain event occurred
  11. 18. A deceptive activity in which a person creates a fictional persona of a fake identity on social networking services, and usually targeting a specific victim
  12. 19. A social engineering attack used to steal somebody's personal information
  13. 21. A computer network that links devices within a building or group of adjacent buildings