Across
- 1. A personal computer component that enables users to enter data or instructions into the computer.
- 6. The process which shows that the Microsoft copy is legal.
- 7. A type of printer that forms images by spraying ink onto the paper.
- 8. A type of attack that uses multiple devices on disparate networks to launch the coordinated attack from many simultaneous sources.
- 11. A hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
- 13. A small hardware component that, when attached to a computing device, enables addition functionality such as wireless connectivity.
- 14. A networking device that connects multiple networks that use the same protocol.
- 16. A software-based network device that has the same functionality as a switch.
- 17. A means of securing the electronic components to a circuit board using a combination of lead, tin, and silver, and a heated iron.
- 19. A cloud storage solution that is accessed by using the user’s Apple ID.
- 21. A peer-to-peer Microsoft network model that groups computers together for organizational purposes, often deployed in homes and small offices.
- 23. Mobile technology that can determine the orientation of a device with a sensor that measures the acceleration of the device direction.
- 26. A type of client or computer that relies heavily on another system, typically a server, to run most of its programs, processes, and servers.
- 27. A component in a file system hierarchy that provides a container to organize files and other containers. Also called a folder.
- 30. A domain name that specifies its exact location in the tree hierarchy of the domain name system.
- 31. A transmission scheme where a single signal sends data using the entire bandwidth of the transmission media.
- 32. A form of DSL in which downloads run faster than uploads.
- 33. An electrostatic-sensitive dry ink substance used in laser printers.
- 34. Type of email-based social engineering attack in which the attacker sends an email from a spoofed source, to try to elicit information from the victim.
- 38. Wires etched onto the motherboard to provide electrical pathways.
- 43. In virtualization technology, an application that is installed on the host machine and is used to configure and manage the VMs running on the host.
- 44. The file and folder management app that is included with OS X.
- 47. Type of computer drive that is either internal or external to a computer system, that reads and writes data to a disk.
- 50. A component that interacts directly with users and functions as the command interpreter for the Linux operating system.
- 51. A family of networking technologies that provide connectivity by using network adapters, contention-based media access, and twisted pair, coax, or fiber media.
- 53. A PC component that provides temporary workspace for the processor.
- 54. A Microsoft network model than an admin implements by grouping computers together for the purpose of sharing a centralized user account database, enabling users to log on to any computer in the network.
- 56. The smallest discrete element on a display, composed of a red, a blue, and a green dot.
- 59. An open-standards UNIX derivative originally developed and released by a Finnish computer science student named Linus Torvalds.
- 60. A network resource, such as a disk, folder, or printer, that is available to other computer users on the network.
- 62. A computer that provides services and resources on the network.
- 63. The interface standard for integrating drive controllers directly on disk drives.
- 65. In Windows, security settings that control access to individual objects, such as files.
- 68. A piece of code that spreads from one computer to another on its own, not by attaching itself to another file.
- 70. The unit of measurement for visible light that is being emitted from a light source.
- 71. A power protection device that creates its own electricity through the use of motors.
- 72. The main circuit board in a computer that acts as the backbone for the entire computer system.
- 73. Windows OS’s main tool to allow users to log in using biometrics.
- 74. The central configuration database where Windows stores and retrieves startup settings and information for local user accounts.
Down
- 1. A laptop component that converts DC power to AC power for the display.
- 2. Operating system for mobile devices.
- 3. An automated method of recognizing a person based on a physiological or behavioral characteristic unique to the individual.
- 4. In printing, a page orientation that is wider than it is tall.
- 5. The process that enables automatic printing on both sides of printing media.
- 9. Finger movements on a trackpad or mouse that enable a user to scroll, zoom, and navigate desktop, document, and application content.
- 10. A software program or hardware device that protects networks from unauthorized data by blocking unsolicited traffic.
- 12. The number of complete cycles per second in an analog wave or radio wave.
- 15. In a computer system, a group of wires that connect components. They provide a pathway for data transfer.
- 18. A unit of measurement that indicates cycles or occurrences per second.
- 20. A security feature that provides full disk encryption protection for your operating system, as well as the data stored on the operating system volume.
- 22. The process of dividing a single HDD into isolated sections that function as separate physical hard drives.
- 24. A disk fault-tolerance method in which data from an entire partition is copied onto a second drive.
- 25. A device that converts digital data to an analog signal that can be sent over a telephone line.
- 28. A wireless radio technology that facilitates short-range (usually less than thirty feet) wireless communication between devices, thus creating a wireless PAN.
- 29. The typical form of illumination used in a full-sized LCD display.
- 35. The point at which two devices connect and communicate with each other.
- 36. A networking device used to connect the drops in a physical star topology network into a logical bus topology. AKA multiport repeater.
- 37. On touch screen displays, a layer of sensors between the LCD display and a layer of glass that enables the translation of the analog touch signal to a digital signal.
- 39. An application that scans files for executable code that matches patterns known to be common to viruses, and monitors systems for activity associated with virus.
- 40. Malicious code that masquerades as a harmless file. When a user executes it, thinking it is a harmless application, it destroys and corrupts data on the user’s HDD.
- 41. An OS X app that enables users to install Microsoft Windows and then switch between OS X and the Windows OS.
- 42. The unencrypted form of data, AKA plaintext.
- 45. Malicious code that is designed to hide the existence of processes or programs from normal detection methods and to gain continuous privileged access to a computer system.
- 46. The software that allows the computer to virtually run another operating system, or another instance of the same operating system.
- 48. In encryption, the rule, system, or mechanism used to encrypt data.
- 49. The number of pixels that make up the dimension of a display, represented in a ratio as the number of horizontal pixels by vertical pixels.
- 52. A set of devices that has been infected by a control program called a bot that enables attackers to exploit them and mount attacks.
- 55. Software stored in memory chips that retains data whether or not power to the computer is on.
- 57. A chip which stores communication information for all hardware on a system.
- 58. A hardware connection interface on a PC that enables devices to be connected to the computer, or the endpoint of a logical connection that client computers use to connect to specific server programs.
- 61. A power option available in Windows environments that the computer will store whatever is currently on memory on the hard disk and then shut down, and then return to the state it was in upon hibernation when it is awakened.
- 64. A method used to connect devices to the internet using optic cable.\
- 66. A group of computers that are connected together to communicate and share resources.
- 67. A program that advertises products while visiting a website.
- 69. A fix or update for a software program or application, designed to eliminate known bugs or vulnerabilities and improve performance.
