computer vocabulary

12345678910111213141516171819
Across
  1. 1. an external serial bus interface and standard for connecting peripheral devices to a computer
  2. 5. being or serving as an element (in something larger); composing; constituent:
  3. 6. Security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
  4. 7. use reasonable and limited use of copyrighted material so as not to infringe upon copyright:
  5. 8. a label or name given to a function
  6. 10. Drive a very small, portable, solid state hard drive that can be inserted into a USB port for storage and retrieval of data
  7. 11. you are finished make a crossword puzzle with all your vocab
  8. 12. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system
  9. 14. relating the granting of an official license
  10. 17. a piece of writing or other work reflecting such unauthorized use or imitation
  11. 19. a word or other string of characters, sometimes kept secret or confidential, that must be supplied by a user in order to gain full or partial access to a computer, computer system, or electronic device.
Down
  1. 2. a website designed to make it easy for users to create entries in chronological order
  2. 3. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.: works granted such right by law on or after January 1, 1978, are protected for the lifetime of an author or creator and for a period of 70 years after their death.
  3. 4. or unit that operates separately from the CPU but is connected to it, as a mouse, printer, speakers, etc.
  4. 6. the rules of etiquette that apply when communicating over computer networks, especially the internet.
  5. 9. wide area network
  6. 11. a web-based collaborative platform that enables users to store, create and modify content in an organized manner
  7. 13. local area network
  8. 15. disruptive online messages, especially commercial messages posted on a computer network or sent as email
  9. 16. replacement of a single course of stonework by two or more lower courses.
  10. 18. acceptable use policy