Across
- 1. logger a program, sometimes part of a Trojan horse, that Records computer activity, such as a user's keystrokes, emails, sites visited, and chat session And then sends them to a system admin. or remote hacker.
- 4. rules determining the format and transmission of data
- 6. device A device that is attached to the computer and aids in input and/or output, or storage capabilities such as printer
- 8. processor begins fetching a second instruction before it completes the machine cycle for the first instruction
- 9. 1024 bytes or 1,000 bytes
- 10. animation that shows 3D subjects moving in rapid, jerky ways that are impossible in the real world
- 11. system A computer system that collects, stores and processes info. Usually within the content of an organization
- 15. language A programming language that is designed to be easy for a computer to execute; also called "machine language" or "assembly language."
- 19. . A way of organizing a collection of docum. By assigning an address to each and providing a way to link from one address to another
- 20. framework A concept developed by James Wetherbe to help identify problems in an information system. Each letter of PIECES stands for a potential problem (Performance, Information, Economics, Control, Efficiency, and Service).
- 22. in terms of spreadsheets: common text used to describe data
- 23. an email based scam that’s designed to fool users into reveling confidential info.
- 24. 802.11 x standards: standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands
- 25. Local Area Network: interconnected gp. of computers & peripherals located within a relative limited area, such as a building or campus
- 26. transfer data from one computer to another via a cable that links connecting ports
Down
- 1. Stuffing An unpopular practice of including a huge variety of keywords in the header of an HTML document in the hopes that a search engine will display it even when the content of the page is not relevant to the search.
- 2. type The structure of a record, including the names, length, and data types for each field. 615
- 3. The process of superimposing a grid over a vector image and determing the color depth for each pixel.
- 4. the illegal copying and selling of movies without permission of copyright holder
- 5. Internet Service Provider. A company that provides internet access to a business, organization or individual
- 7. an application that allows the user to create and save slides to use as a slide show
- 10. packet Internet groper: command on TCP/IP network that sends a test pkt. to a specified Ip address and waits for a relpy
- 12. a scratch pad area of the microprocessor which holds data or instructions and are moved so that they can be processed
- 13. the core module of an OS that typically manages memory, processes, tasks and storage devices.
- 14. exploit that automatically redirects the user to a fake web site
- 16. data types a data type specifying that a field in a data file is used to store true/ false or yes/no data
- 17. Info that is conveyed to computer
- 18. Joint Photographic Experts Group: a format that uses lossy compression to store bitmap images
- 21. error a run-time error in the logic or design of a computer program
- 22. An operating system based on UNIX, maintained by volunteers, and distributed for free. Linux is used mostly in servers and embedded computers, but is growing in popularity as a PC operating system.
- 23. chart program evaluation and review technique chart : a project management techniques that displays interconnected events and milestones on a time line
- 25. liquid crystal display. Technology used for slat panel computer screens, typically notebooks
- 26. Post Office Protocol .Or POP3. A standard for retrieving email message from an email server
- 27. Random Access Memory: computer memory circuitry that holds data, program instructions and the operating system while the computer is on.
