Across
- 1. an external serial bus interface and standard for connecting peripheral devices to a computer
- 5. being or serving as an element (in something larger); composing; constituent:
- 6. Security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
- 7. use reasonable and limited use of copyrighted material so as not to infringe upon copyright:
- 8. a label or name given to a function
- 10. Drive a very small, portable, solid state hard drive that can be inserted into a USB port for storage and retrieval of data
- 11. you are finished make a crossword puzzle with all your vocab
- 12. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system
- 14. relating the granting of an official license
- 17. a piece of writing or other work reflecting such unauthorized use or imitation
- 19. a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer, computer system, or electronic device.
Down
- 2. a website designed to make it easy for users to create entries in chronological order
- 3. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.: works granted such right by law on or after January 1, 1978, are protected for the lifetime of an author or creator and for a period of 70 years after their death.
- 4. or unit that operates separately from the CPU but is connected to it, as a mouse, printer, speakers, etc.
- 6. the rules of etiquette that apply when communicating over computer networks, especially the internet.
- 9. wide area network
- 11. a web-based collaborative platform that enables users to store, create and modify content in an organized manner
- 13. local area network
- 15. disruptive online messages, especially commercial messages posted on a computer network or sent as email
- 16. replacement of a single course of stonework by two or more lower courses.
- 18. acceptable use policy
