Across
- 6. data information processed by a computer.
- 7. Tags are used to determine what and how something is displayed on a Web Page. Tags are the foundation of HTML code and are used for design and content structuring.
- 10. firewall is a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- 12. cache When you download (read) a web page, the data is "cached," meaning it is temporarily stored on your computer.
- 14. Pixel The short form for ‘Picture Element’, a Pixel is what makes up displays and images on a computer screen.
- 17. browser software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
- 18. online If a computer (or computer user) is online, it is currently connected to a network or to the Internet. Online also refers to resources and services available on the Internet - e.g. online banking, online dictionary.
- 19. Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
- 20. Downloading is the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
- 21. Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment
- 22. boot (or re-boot) is to load and initialise the operating system on a computer. Think of it as starting up your computer. In Windows you can use the key combination CTRL and ALT and DEL as a "soft" boot. This means restarting the computer rather than turning it completely off and on again, which could cause damage to your computer's hard disk under some circumstances.
- 23. Analogue is a conventional method of transmitting data. Standard landline telephones use analogue technology. It is distinct from digital technology, which provides for greater quality and speed of data transmission.
- 26. bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as "favourites."
- 30. Compression is the reduction of the size of a file. Compressed files take up less memory and can be downloaded or sent over the Internet more quickly.
- 32. freeze a system error which causes the cursor to lock in place.
- 34. bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
- 36. Spam refers to unsolicited email messages sent for marketing purposes.
- 38. partition a subdivision of a hard drives surface that is defined and used as a separate drive.
- 39. gateway point within a network that interconnects with other networks.
- 40. zip files is to archive and compress them into one file of smaller size using a program such as WinZip. It's a handy way to make files smaller before sending them via email.
- 41. processor is the brains of your computer. It is responsible for performing calculations and tasks that make programs work. The faster the processor, the faster the computer works.
- 42. a programming error that causes a program to behave in an unexpected way.
- 43. attachment is a document sent with an email message. Many types of files can be sent this way (e.g. Word documents, PDFs, Excel files, JPEGs). Be wary of attaching large files because these can take a lot of time for the recipient to download. If you have a large file, it is considered good practice to compress the file using software such as Winzip before attaching it.
- 46. modem is a device that allows computers to transmit information to each other via ordinary telephone lines.
- 47. drag to move the mouse while its button is being depressed.
Down
- 1. Email or electronic mail is a way of sending messages over the internet. Popular email programs include Outlook, Mozilla Thunderbird, Gmail and Yahoo Mail.
- 2. viral If an online video, photo or article "goes viral", it experiences a sudden spike in popularity in a short period of time.
- 3. Java is a programming language that is commonly used in the development of client-server web applications.
- 4. Malware" is short for malicious software. It refers to a software program that has been developed to do harm to other computers. Types of malware include viruses, worms and spyware.
- 5. URL is short for ‘Uniform Resource Locator’ and is the web address of a specific Website or file location.
- 8. server is a computer that handles requests for data, email, file transfers, and other network services from other computers.
- 9. JPEG stands for Joint Photographic Experts Group, which was the committee that created the file format known as JPEG. The format is commonlyl used for photos displayed on the world wide web.
- 11. Ethernet is the most common way of connecting computers on a network with a wired connection. It is a type of local area network (LAN) technology, providing a simple interface for connecting multiple devices
- 13. internet set of interconnected networks that allow computers in different locations to exchange information. The Internet includes services such as the world wide web, electronic mail, file transfer protocol (FTP), chat and remote access to networks and computers.
- 14. protocol is a standard or set of rules that computers and other devices use when communicating with one another.
- 15. hyperlink Is a link embedded within a photo, word, or document that allows you to navigate around a webpage and/or to an external page or file.
- 16. Content refers to a website's text and information, as opposed to its design and structure.
- 19. Broadband is a type of communications technology whereby a single wire can carry more than one type of signal at once; for example, audio and video. Cable TV is one technology that uses broadband data transmission.
- 24. Encryption is the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
- 25. domain is a set of computers on a network that are managed as a unit.
- 27. megabyte measure of computer processor storage and real and virtual memory. A megabyte (Mb) is 2 to the 20th power bytes, or 1,048,576 bytes in decimal notation.
- 28. virus is a piece of programming code inserted into other programming to cause damage.
- 29. Software Software is essentially a computer program. Photoshop and Word are examples of Software and were created by computer programmers using lines of code.
- 30. Cybercrime is any type of illegal activity that is undertaken (or relies heavily) on a computer. There are thousands of types of cybercrime, including network intrusions, identity theft and the spreading of computer viruses.
- 31. Megahertz is the unit used to measure the speed of a computer's processor (e.g. 2.8Ghz)
- 33. Phishing is a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider.
- 35. unzip a zip file is to extract and decompress compressed files from it. If you are sent a zip file via email, you will need to unzip it before you can access the files inside it.
- 37. backup a copy of a file or disk you make for archiving purposes.
- 44. cookie A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences.
- 45. cloud Often represented by the shape of a Cloud, Cloud Computing is the delivery of applications and services over the internet
