Computer Vocabulary

12345678910111213141516171819
Across
  1. 3. A piece of writing or other work reflecting such unauthorized use of imitation.
  2. 4. use Reasonable and limited use of copyrighted material so as not to infringe upon copyright
  3. 7. A word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer, computer system or electronic device
  4. 8. Security Is a broad term that covers a multitude of technologies, devices and processes.
  5. 10. A website that allows users to add delete or revise content by using a web browsers.
  6. 13. disruptive online messages, especially commercial messages posted on a computer network or sent as email (often used attributively):
  7. 17. a device or unit that operates separately from the CPU but is not connected as a mouse printer, speaker, etc
  8. 19. grant authoritative permission or license to.
Down
  1. 1. The exclusive right to make copies, licence ad, otherwise exploit a literary musical, or artistic work, whether printed, audio, video etc. works granted such right by law on or after January 1, 1978 are protected for the lifetime of an author or creator and for a period of 70 years after their death
  2. 2. A very small portable, solid-state hard drive that can be inserted into a USB port for storage and retrieval of data
  3. 5. a replacement of a single course of stonework by two or more lower courses
  4. 6. An external serial bus interface standard for connection peripheral devices to a computer, as in a USB port or USB cable
  5. 8. the rules of etiquette that apply when communicating computer networks, especially the internet,
  6. 9. lacking in forcefulness, competence, or effectiveness
  7. 11. A document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
  8. 12. A part of a mechanical or electrical system
  9. 14. An integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system
  10. 15. A website containing a writer’s or group of writers’ own experiences, observations, options, etc. and after having images and links to other websites
  11. 16. The state or fact of remaining the same one or ones, as under varying aspects or conditions.
  12. 18. local area network