MIDTERM

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 4. First computer program
  2. 6. This type of computer typically sits on a desk and runs on power from an electrical wall outlet
  3. 8. A physical object used in computers to store data, information, and programs
  4. 9. It is an example of a highly automated consumer product.
  5. 11. The first computerized spreadsheet program
  6. 16. IBM's first personal computer
  7. 17. An electrical component with switch and amplifier functions. In radios, televisions, computers, and other devices, it is used to regulate the flow of power
  8. 19. This is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
  9. 21. Largest type of computer
  10. 23. Detects malfunctions and identifies the causes of failure
  11. 26. Used to track the system’s operation and identify unsafe conditions
  12. 27. Another name for Supercomputers
  13. 29. Uses a system of cores—small rings of magnetic material—to store data
  14. 30. This was invented by the Heinrich Hertz in 1888.
  15. 32. AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
  16. 33. It is a specialized branch of automation in which the automated machine possesses certain anthropomorphic, or human-like, characteristics.
  17. 34. They monitor cybercrime cases being bandied by participating law enforcement and prosecution agencies.
  18. 35. They are large and expensive computers capable of simultaneously processing data for hundreds or thousands of users.
  19. 36. Type of computer is designed to meet the computing needs of an individual
  20. 37. The purchasing of a domain name online with the intent to profit, deceive, harm reputation, and prevent others from registering the same, if such a domain name is available.
  21. 38. FORTRAN is an acronym for ______.
  22. 39. The unauthorized introduction or transmission of viruses, as well as the deliberate or careless alteration, destruction, deletion, or degradation of computer data, an electronic document, or an electronic data communication.
Down
  1. 1. Penalty for Illegal Access.
  2. 2. He built the first electro-mechanical computer.
  3. 3. A modern desktop in which the computer circuitry is incorporated into the display device
  4. 5. A piece of electronics that regulates the movement of electrons in a vacuum
  5. 7. The purposeful use of a computer system to engage in, maintain, control, or operate any lewd display of sexual organs or sexual behavior, whether directly or indirectly, in exchange for a favor or reward.
  6. 8. A low-level programming language that the computer can read and interpret that is made up of a group of binary digits
  7. 10. This was designed to meet the computing needs of an individual
  8. 12. A device invented around 1860 by Antonio Meucci.
  9. 13. A database that houses information.
  10. 14. The unauthorized use of any portion or the entire computer system
  11. 15. The willful modification or careless obstruction or interference with the operation of a computer or computer network through the input, transmission, destruction, deletion, degradation, alteration, or suppression of computer data or programs, electronic documents, or electronic data messages, including the introduction or transmission of viruses.
  12. 18. Fastest type of computer
  13. 20. The origin of the global communications network
  14. 22. A magnetically coated cylinder that can be used to store data and programs
  15. 24. He invented the floppy disk
  16. 25. An electronic component that is part of an integrated circuit
  17. 28. He created the Analytical Engine
  18. 31. The world's first commercially successful word processor