Crossword

12345678910111213141516171819202122
Across
  1. 2. It is a similar technology from the aspect of the connection
  2. 7. It is a unit of measurement of the frequency.
  3. 10. Is a magnetic type data storage medium.
  4. 12. Computer main memory, where programs and data reside.
  5. 13. Removable flash memory card used to store digital information, such as programs and files.
  6. 14. It is an input device or peripheral, which uses a system of stitches or margins, to act as mechanical levers or electronic switches that send all the information to the computer.
  7. 15. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
  8. 16. Problem in a computer program or software system.
  9. 17. Type of optical disc for data storage.
  10. 19. A defensive technology designed to keep the bad guys out.
  11. 20. Computer device that is operated with one hand and allows you to direct the movement of the pointer on the screen to transmit various commands.
  12. 22. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
Down
  1. 1. Is a data storage device that uses a magnetic recording system to store and retrieve digital files.
  2. 3. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
  3. 4. Peripheral computer output device that enables a permanent range of texts or graphics to be produced from documents stored in an electronic format to physical media.
  4. 5. Set of programs and routines that allow the computer to perform certain tasks.
  5. 6. It is a printed circuit board to which the components that make up the computer are connected.
  6. 8. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  7. 9. Set of data belonging to the same context and systematically stored for later use.
  8. 11. It is a mass storage device that uses flash memory to store the information you may require.
  9. 18. A technique used by hackers to obtain sensitive information.
  10. 21. Electronic device used to reproduce digital files with this compression format