Across
- 6. small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
- 7. a type of artificial intelligence that produces new content, such as text, images, music, video, and code, by learning from large datasets and responding to user prompts
- 8. the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions
- 11. an electro-mechanical data storage device that stores and retrieves digital data
- 12. a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- 15. a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing.
- 17. an application for accessing websites.
- 20. a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts it can be a question or a personal security pin that you made a smartphone or hardware security key and remembering who you are like fingerprints or facial recognition.
- 23. the responsible, respectful and safe, use of technology in daily life, along with online safety, and privacy,
- 24. a programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
Down
- 1. the theory and development of computer systems able to perform tasks that normally require a human intelligence, such as visual perception, speech recognition, decision making, and translation between languages
- 2. a computing device designed to fit on top of a typical office desk.
- 3. a a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
- 4. the ability to responsibly use digital technologies,and the internet to find,, use, share, and create i google
- 5. Wi-Fi is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- 9. a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from none allowed access and intruders.
- 10. a mobile device that combines traditional mobile technology with more advanced computing abilities.
- 13. technology used to connect computers to peripheral devices, such as computer mouses and USB flash drives.
- 14. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- 16. a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage
- 18. a quotation from or reference to a book, paper, or author,
- 19. the practice of pretending on social media to be someone different, in order to trick or attract another person
- 21. a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line,
- 22. a form of social engineering and a scam where attackers on or installing malware such as viruses, worms, adware, or ransomware.
- 25. a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it.
