deonte wescott 2

12345678910111213141516171819202122232425
Across
  1. 2. address of a World Wide Web page.
  2. 3. was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model.
  3. 6. Internet's system for converting alphabetic names into numeric IP addresses.
  4. 8. firewall is a network security system designed to prevent unauthorized access to or from a private network
  5. 10. is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it
  6. 12. page formatting, and 3) file formats. 1) Disk formatting. In order for storage media, such as a hard drive or flash drive to be recognized by your computer.
  7. 13. software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  8. 15. data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells
  9. 16. unit of information equal to one billion (109) or, strictly, 230 bits.
  10. 17. is a computer network that spans a relatively small area. Most often
  11. 20. printing:device that creates three-dimensional objects. Like a traditional printer, a 3D printer receives digital data from a computer as input.
  12. 21. computer networking, or other communication using radio signals, microwaves, etc.
  13. 23. cursor is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.
  14. 24. power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
  15. 25. unit of memory or data equal to 1,024 (210) bytes
Down
  1. 1. is a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
  2. 4. to the act of creating a virtual version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
  3. 5. as the 802.3 standard by the IEEE, the Ethernet access method is used to connect computers in a company or home network as well as to connect a single computer to a modem for Internet access.
  4. 7. a common measure of data speed for computer modems and transmission carriers.
  5. 9. A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web
  6. 11. system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program
  7. 14. first screen of information displayed when a smartphone or tablet is started.
  8. 18. arrangement of intersecting horizontal and vertical lines.
  9. 19. hacking refers to the practice of modifying or alteringcomputer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.
  10. 22. a device for examining, reading, or monitoring something, in particular.