Across
- 2. files embedded within online communication channels such as emails, instant messages, or social networks
- 5. the transmission of high-quality data of wide bandwidth.
- 7. a type of malware that downloads onto a computer disguised as a legitimate program
- 8. a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
- 13. the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
- 15. used to refer to computer files or memory that can be read or used, but not changed or added to in any way
- 16. a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
- 18. the amount of data that can reside within the disk drive or storage medium to a maximum limit.
- 19. allows devices to communicate with each other without cables or wires.
- 20. the practice of protecting systems, networks, and programs from digital attacks
- 22. a data measurement unit applied to digital computer or media storage
- 23. a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
- 24. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- 26. a file format that can contain multiple files combined and compressed into one file.
- 27. the use or operation of computers.
- 28. A computer program that can copy itself and infect a computer without permission or knowledge of the user
- 31. the capacity at which a network can transmit data.
- 34. the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
- 38. malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
- 39. the logic circuitry that responds to and processes the basic instructions that drive a computer
Down
- 1. the ability of software and hardware from different sources to work together without having to be altered to do so
- 3. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
- 4. a software program used to locate and display information on the Internet or an intranet.
- 6. a unit of data that is eight binary digits long
- 9. Any stored data.
- 10. a set of rules for formatting and processing data.
- 11. device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
- 12. a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
- 14. the number of pixels that are displayed per inch for an image
- 17. computer systems that are connected to a network and are accessible to users from anywhere at any time
- 21. any unsolicited communication sent in bulk.
- 25. a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
- 27. small files of information that a web server generates and sends to a web browser
- 29. to reload the operating system of a computer:
- 30. the smallest unit of data that a computer can process and store.
- 32. the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
- 33. any criminal activity that involves a computer, network or networked device.
- 35. a tiny wafer of semiconducting material with an embedded electronic circuit.
- 36. a computer on a network that provides the interface between two applications or networks that use different protocols
- 37. an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.