Across
- 3. ..... are a malicious type of spyware which will record everything you type into your computer.
- 4. ..... is an example of operating system which is owned by Apple and runs on a MAC laptop.
- 7. ..... are hardware components that allow you to enter data and instructions into a computer.
- 8. ..... is a network of computers within a small area. The main characteristics are high data exchange rates and small geographic area coverage.
- 10. ..... covers a larger geographic area than either LAN or MAN.
- 11. ..... is a form of viruses which send copies of themselves over the network, often via email. They consume vast amounts of computer memory and Internet bandwidth.
- 13. ..... CD-Roms, DVD-Roms and Blu-Ray drives are examples of ..... which they are attach to the motherboard using an internal cable. These devices record and store data for later retrieval.
- 15. ..... are programs that at first glace appear to be useful but actually contain a malicious code. Some of them can hijack your computer, giving hackers complete access to your PC.
Down
- 1. ..... acts as coverters or translators. They allow digital data or information to be transmitted over analogue lines such as a telephone line.
- 2. ..... system, which means that it uses Icons and Windows to show and access data stored in the computer.
- 5. ..... software provides the interface between the hardware and the users by managing the computer resources.
- 6. ..... software provides the user with the ability to complete their everyday duties and tasks by giving them the tools that helps them to accomplish their work effectively and productively.
- 9. A computer ..... is a collection of computers and devices connected by communications channels that allow communications and the sharing of resources and information among the devices.
- 12. The ..... is the core of a computer system. Inside the box are many electronic components that process information, for example, RAM and graphic cards.
- 14. ..... is a unit in measuring the speed of a CPU.
