Computer Literacy Crossword

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
Across
  1. 4. Fingerprint or face as authentication
  2. 6. Spreadsheet reference with $ signs
  3. 8. Limited legal use of copyrighted work
  4. 10. Agreed rules for data exchange
  5. 13. Backup components to prevent failure
  6. 15. Maximum data transfer capacity
  7. 18. Numeric label for network device
  8. 20. Blocks unauthorized network traffic
  9. 21. Drive type with no moving parts
  10. 22. Step-by-step problem-solving procedure
  11. 25. Image made of pixels
  12. 26. Licenses for sharing and remixing
  13. 27. Software embedded in hardware
  14. 30. Actual data delivered per second
  15. 38. Core of an operating system
  16. 39. Trace of your online activity
  17. 41. Named storage for changing data
  18. 43. Scrambling data with a key
  19. 44. Systematic unfairness in automated systems
  20. 47. Grid software for data and formulas
  21. 48. Login with password plus second step
  22. 50. Service that translates names to IPs
  23. 52. Software that lets OS use hardware
  24. 54. Software that encodes/decodes media
  25. 55. Tool to summarize table data
Down
  1. 1. How easy a system is to use
  2. 2. Compression without losing information
  3. 3. Audio/video data per second
  4. 5. Image made of scalable paths
  5. 6. Design usable by all people
  6. 7. Encrypted tunnel over public internet
  7. 9. One-way function to fingerprint data
  8. 11. Value exceeds storage limits
  9. 12. Logic using true/false values
  10. 14. Finding and fixing code errors
  11. 16. Repeating steps in a loop
  12. 17. Data that describes other data
  13. 19. Plain-language plan for code
  14. 23. Giving credit to sources used
  15. 24. Turning ciphertext back to plaintext
  16. 25. Forwards data between networks
  17. 28. False info shared without intent to harm
  18. 29. Fraudulent messages to steal info
  19. 31. Detail level in images or screens
  20. 32. Main circuit board in a computer
  21. 33. External device like keyboard or mouse
  22. 34. Malware that locks files for payment
  23. 35. Harmful software umbrella term
  24. 36. Using others’ work without credit
  25. 37. Time delay in data transfer
  26. 40. Rules for writing valid code
  27. 42. Small, fast memory for quick access
  28. 45. Small website data stored in browser
  29. 46. Reducing file size
  30. 47. Faking identity or address online
  31. 49. Spreadsheet reference that shifts
  32. 51. Tracking changes to files/projects
  33. 52. Human-readable website address
  34. 53. Temporary connection between client/server