Across
- 5. point The ____ is a blinking vertical bar that indicates where text, graphics, and other items will be inserted. from wd1 2 wds
- 6. A(n) ____ address is a number that uniquely identifies each computer or device connected to the Internet. from dc2
- 8. A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location. from dc2
- 10. ____ is the process of transferring data in a continuous and even flow. from dc2
- 12. ____ software is a type of application software that allows users to create and manipulate documents containing mostly text and sometimes graphics. from dc3 2 wds
- 15. A(n) ____ is a private combination of characters associated with the user name that allows access to certain computer resources. from dc4
- 17. ____ is a series of instructions that tells a computer what to do and how to do it. from DC1
- 18. The purpose of __________ is to optimize the use of RAM. from dc4 2 wds
- 20. ____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. from dc5
- 21. The term ____ refers to online or Internet-based illegal acts. from dc5
- 23. ____ are words or phrases that describe a document. from wd1
- 24. A personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions. from dc4
- 25. A(n) ____ boot is the process of using the operating system to restart a computer. from dc4
- 26. When users ____ a document, they change its appearance. from dc3
- 27. A software ____ is a collection of individual application programs sold as a single package. from dc3
Down
- 1. The _____, or typeface, defines the appearance and shape of letters, numbers, and special characters. from wd1
- 2. The ____ is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals. from dc2
- 3. With a ____, you interact with software using text, graphics, and visual images. from DC1 3 wds
- 4. A(n) ____ device like the one in the accompanying figure authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. from dc5
- 7. A(n) ____ is the destructive event or prank malware is intended to deliver. from dc5
- 9. A content ____ is a business that gathers and organizes Web content and then distributes, or feeds, the content to subscribers for free or a fee. from dc2
- 11. A _____ is a window that can remain open and visible while you work in the document. from wd1
- 13. A(n) ______ is a request for specific data from a database from dc3
- 14. A ____ computer is a computer that can perform all of its input, processing, output, and storage activities by itself. from DC1
- 16. Each ____ on the Ribbon surrounds a collection of groups, and each group contains related commands. from wd1
- 18. ____ consist(s) of a computer’s electronic components that store instructions waiting to be executed and data needed by those instructions. from DC1
- 19. Computer ____ entails having knowledge and understanding of computers and their uses. from DC1
- 20. A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. from dc5
- 22. ____ software is application software that assists people in becoming more effective and efficient while performing their daily business activities. from dc3
- 28. A(n) ____ interface controls how you enter data and instructions and how information is displayed on the screen. from dc4
