Information Technology Career Cluster

123456789101112131415
Across
  1. 3. Part of a computer system that is designed to block unauthorized access
  2. 5. A program used to view Web pages.
  3. 7. unwanted e-mail (usually of a commercial nature sent out in bulk)
  4. 11. a small amount of data generated by a website and saved by your web browse to remember information about you.
  5. 13. helps increases or maintains the capabilities of a person with a disability
  6. 14. the process of converting human instructions into a language that a computer can understand and follow
  7. 15. a person who designs, writes and installs computer programs and applications
Down
  1. 1. type of software that can process information on its own without human intervention.
  2. 2. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  3. 4. Measures taken to protect a computer or computer system against unauthorized access or attack
  4. 6. identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
  5. 8. new technologies that aim to conserve the natural environment and resources.
  6. 9. A global network connecting millions of computers, making it possible to exchange information.
  7. 10. The amount of data that can be transmitted over a network in a given amount of time.
  8. 12. the development, maintenance, and use of computer software, systems, and networks