Computer basics

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 1. The responsible and ethical use of technology and the internet.
  2. 8. Unsolicited or unwanted electronic messages, often sent in bulk.
  3. 11. A security system that protects a computer network from unauthorized access.
  4. 12. When something, such as a video or a post, becomes extremely popular and spreads rapidly on the internet.
  5. 15. A machine that can store, process, and retrieve data, and can be used for various tasks like writing documents, playing games, and browsing the internet.
  6. 16. A person who deliberately provokes or harasses others online to generate conflict and disruption.
  7. 17. A security system that protects a computer network from unauthorized access.
  8. 19. A device that converts physical documents or images into digital formats that can be stored or manipulated on a computer.
  9. 22. The physical components of a computer system, such as the keyboard, monitor, and hard drive.
  10. 23. An abbreviation for Universal Serial Bus, a common interface used to connect devices to a computer.
  11. 25. The process of transferring data or files from a local device to a remote computer.
  12. 26. A way of sending and receiving messages electronically over the internet.
  13. 28. A device with buttons or keys that allow users to input characters and commands into a computer.
  14. 29. A service that allows users to store and access their data remotely over the internet.
  15. 31. A technology that allows devices to connect to the internet wirelessly.
  16. 37. The screen or display unit that shows the visual output from a computer.
  17. 38. Small digital images or icons used to express emotions or ideas in electronic communication.
  18. 40. A device that produces a hard copy of digital documents or images.
  19. 41. A person who gains unauthorized access to computer systems or networks with malicious intent.
  20. 43. A digital audio or video file that can be downloaded or streamed, often discussing specific topics or featuring interviews.
  21. 45. Small digital images or icons used to express emotions or ideas in electronic communication.
  22. 46. The act of buying products or services over the internet.
  23. 47. Adding geographical information, such as location coordinates, to digital media like photos or posts.
  24. 48. Measures and practices taken to protect computer systems and data from unauthorized access or attacks.
  25. 49. A collection of webpages that are accessed through the internet and can contain information, images, videos, and other content.
Down
  1. 2. A global network of computers that allows people to connect and share information.
  2. 3. Online platforms that enable users to create, share, and interact with content and connect with other people.
  3. 4. A fraudulent practice where individuals are tricked into revealing sensitive information, such as passwords or credit card numbers, through deceptive emails or websites.
  4. 5. The use of electronic communication to harass, intimidate, or threaten someone.
  5. 6. A tool that helps users find information on the internet by entering keywords or phrases.
  6. 7. The use of internet-based platforms and resources to facilitate learning and education
  7. 9. A technology that overlays digital information, such as images or text, onto the real world.
  8. 10. A collection of data or information stored on a computer under a specific name and location.
  9. 13. The process of transferring data or files from a remote computer to a local device.
  10. 14. A small piece of data stored on a user's computer by a website, used to remember information and enhance the browsing experience.
  11. 18. An abbreviation for Uniform Resource Locator, it is the address used to access a website on the internet.
  12. 20. A word or phrase preceded by the "#" symbol used to categorize and group content on social media.
  13. 21. A secret combination of letters, numbers, or symbols used to protect personal information and restrict access to accounts.
  14. 24. An online platform where users can create a profile, connect with others, and share content.
  15. 27. A handheld input device used to move the cursor on a computer screen and make selections.
  16. 30. The protection of personal information and the control over what is shared and accessed on the internet.
  17. 32. The software that manages computer hardware and software resources and provides common services for computer programs.
  18. 33. The trail of data and information left behind by a person's online activities.
  19. 34. The process of transmitting and playing audio or video content in real time over the internet.
  20. 35. Programs and applications that run on a computer, allowing users to perform specific tasks.
  21. 36. A software application used to access and view websites on the internet.
  22. 39. A person who has a large following on social media and can influence the opinions and behaviors of their audience.
  23. 42. Playing video games over the internet, often with other players from around the world.
  24. 44. Software designed to harm or disrupt computers or computer networks.
  25. 50. A website or online platform where individuals or groups share their thoughts, opinions, and experiences.