Across
- 5. - the way in which something is arranged or set out.
- 7. a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- 10. the process of converting information or data into a code, especially to prevent unauthorized access.
- 12. n decimal systems, kilo stands for 1,000, but in binary systems, a kilo is 1,024 (2 to the 10th power). Technically, therefore, a kilobyte is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes. ... In computer literature, kilobyte is usually abbreviated as K or KB.
- 14. a web page set as the default or start-up page on a browser
- 15. A router is a device that forwards data packets along networks.
- 16. a unit of information equal to one billion (109) or, strictly, 230 bits.
- 17. A scanner is an input device that scans documents and images, which can be imported into a computer
- 19. Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses.
Down
- 1. A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program.
- 2. Java was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model
- 3. system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- 4. URL is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web.
- 6. In computing, virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.
- 8. A local-area network (LAN) is a computer network that spans a relatively small area
- 9. A computer network or data network is a telecommunications network which allows nodes to share resources.
- 11. a person who uses computers to gain unauthorized access to data.
- 13. PEG is a lossy compression technique for color images.
- 18. movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
