Josh Wurtz Vocab Lesson 2

12345678910111213141516171819202122232425
Across
  1. 3. A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.
  2. 7. In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers. As the term implies, the speed in bps is equal to the number of bits transmitted or received each second.
  3. 9. a unit of information equal to one billion (109) or, strictly, 230 bits.
  4. 10. home page-Computer Definition .Also known as page and Web page. A document that serves as a starting point on a Web site. A home page typically contains hypertext and navigation buttons that allows the user to navigate the site by clicking them with a mouse and invoking hyperlinks to other pages and even other sites.
  5. 14. A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
  6. 16. software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.
  7. 17. A computer network or data network is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
  8. 18. Also known as Web browser. A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. ... Currently popular browsers include Internet Explorer (IE), Mozilla, and Netscape Navigator.
  9. 19. A scanner is an input device that scans documents and images, which can be imported into a computer. They are available in flatbed or sheet-fed versions and are usually connected via a high-speed USB port. OCR software can be used to recognize text documents imported from a scanner.
  10. 20. The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ;encrypted data is referred to as cipher text.
  11. 22. In computing, virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.
  12. 24. A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect
  13. 25. Domain Name System, The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
Down
  1. 1. In decimal systems, kilo stands for 1,000, but in binary systems, a kilo is 1,024 2 to the 10th power. Technically, therefore, a kilobyte is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes In computer literature, kilobyte is usually abbreviated as K or KB.
  2. 2. data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
  3. 4. The term "format" has several meanings, related to 1) disk formatting, 2) page formatting, and 3) file formats. 1) Disk formatting. In order for storage media, such as a hard drive or flash drive to be recognized by your computer, it first needs to be initialized, or "formatted."
  4. 5. Short for Joint Photographic Experts Group, and pronounced jay-peg. JPEG is a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
  5. 6. A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
  6. 8. Java was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network.
  7. 11. The most widely used local area network (LAN) technology. Defined as the 802.3 standard by the IEEE, the Ethernet access method is used to connect computers in a company or home network as well as to connect a single computer to a modem for Internet access.
  8. 12. Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”
  9. 13. A 3D printer is a computer-aided manufacturing (CAM) device that creates three-dimensional objects. Like a traditional printer, a 3D printer receives digital data from a computer as input. ... The process of printing a 3D model varies depending on the material used to create the object.
  10. 15. data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
  11. 21. The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
  12. 23. URL is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier URI the generic term for all types of names and addresses that refer to objects on the World Wide Web.