Across
- 2. the responsible, respectful and safe, use of technology in daily life, along with online safety, and privacy,
- 4. internet cookies are small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
- 5. is a form of social engineering and a scam where attackers on or installing malware such as viruses, worms, adware, or ransomware.
- 7. a software program or a system desinged to help users find information
- 10. mobile device that combines traditional mobile technology with more advanced computing abilities.
- 12. the ability to responsibly use digital technologies,and the internet to find,, use, share, and create i google
- 15. a computer system is a collection of communicating computers and all other devices/printers and small phones almost all of the computers are all connected to a computer network such as a global network or an embedded network such as modern cars.
- 16. to help protect the network from none allowed access and intruders.
- 20. In the digital age, consumers are more connected than ever before through smartphones and apps
- 23. is the theory and development of computer systems able to perform tasks that normally require a human intelligence
- 25. is an electro-mechanical data storage device that stores and retrieves digital data
Down
- 1. a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage
- 3. is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet
- 6. It is a system of hardware and infrastructure, like cables and routers, that allows devices around the world to exchange data and information.
- 8. a quotation from or reference to a book, paper, or author,
- 9. are a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing
- 11. is a security method known as a MFA or a security key it provides you the MFA to access to systems, accounts and applications and adds extra security and strength to your accounts
- 13. refers to servers that are accessed over the Internet, and the software and databases that run on those servers
- 14. often shortened to browser, is an application for accessing websites.
- 17. is a security device that is a barrier between internal network and untrustworthy external network the network that regulates incoming/outgoing network
- 18. a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- 19. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- 21. is the brain of a computer, a primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions
- 22. is an increasingly valuable complement to digital signing practices, enabling organizations to record when a digital item—such as a message, document, transaction or piece of software—was signed
- 24. an increasingly valuable complement to digital signing practices, enabling organizations to record when a digital item—such as a message, document, transaction or piece of software—was signed.
