computer 5

123456789101112131415161718192021222324252627
Across
  1. 1. logger a program, sometimes part of a Trojan horse, that Records computer activity, such as a user's keystrokes, emails, sites visited, and chat session And then sends them to a system admin. or remote hacker.
  2. 4. rules determining the format and transmission of data
  3. 6. device A device that is attached to the computer and aids in input and/or output, or storage capabilities such as printer
  4. 8. processor begins fetching a second instruction before it completes the machine cycle for the first instruction
  5. 9. 1024 bytes or 1,000 bytes
  6. 10. animation that shows 3D subjects moving in rapid, jerky ways that are impossible in the real world
  7. 11. system A computer system that collects, stores and processes info. Usually within the content of an organization
  8. 15. language A programming language that is designed to be easy for a computer to execute; also called "machine language" or "assembly language."
  9. 19. . A way of organizing a collection of docum. By assigning an address to each and providing a way to link from one address to another
  10. 20. framework A concept developed by James Wetherbe to help identify problems in an information system. Each letter of PIECES stands for a potential problem (Performance, Information, Economics, Control, Efficiency, and Service).
  11. 22. in terms of spreadsheets: common text used to describe data
  12. 23. an email based scam that’s designed to fool users into reveling confidential info.
  13. 24. 802.11 x standards: standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands
  14. 25. Local Area Network: interconnected gp. of computers & peripherals located within a relative limited area, such as a building or campus
  15. 26. transfer data from one computer to another via a cable that links connecting ports
Down
  1. 1. Stuffing An unpopular practice of including a huge variety of keywords in the header of an HTML document in the hopes that a search engine will display it even when the content of the page is not relevant to the search.
  2. 2. type The structure of a record, including the names, length, and data types for each field. 615
  3. 3. The process of superimposing a grid over a vector image and determing the color depth for each pixel.
  4. 4. the illegal copying and selling of movies without permission of copyright holder
  5. 5. Internet Service Provider. A company that provides internet access to a business, organization or individual
  6. 7. an application that allows the user to create and save slides to use as a slide show
  7. 10. packet Internet groper: command on TCP/IP network that sends a test pkt. to a specified Ip address and waits for a relpy
  8. 12. a scratch pad area of the microprocessor which holds data or instructions and are moved so that they can be processed
  9. 13. the core module of an OS that typically manages memory, processes, tasks and storage devices.
  10. 14. exploit that automatically redirects the user to a fake web site
  11. 16. data types a data type specifying that a field in a data file is used to store true/ false or yes/no data
  12. 17. Info that is conveyed to computer
  13. 18. Joint Photographic Experts Group: a format that uses lossy compression to store bitmap images
  14. 21. error a run-time error in the logic or design of a computer program
  15. 22. An operating system based on UNIX, maintained by volunteers, and distributed for free. Linux is used mostly in servers and embedded computers, but is growing in popularity as a PC operating system.
  16. 23. chart program evaluation and review technique chart : a project management techniques that displays interconnected events and milestones on a time line
  17. 25. liquid crystal display. Technology used for slat panel computer screens, typically notebooks
  18. 26. Post Office Protocol .Or POP3. A standard for retrieving email message from an email server
  19. 27. Random Access Memory: computer memory circuitry that holds data, program instructions and the operating system while the computer is on.