Module 11 Chapter 7 Crossword

123456789101112131415161718
Across
  1. 1. Demilitarized Zone ; Part of a computer network controlled by a firewall that allows computers (such as web servers) to be accessible from the Internet but isolated from the internal network
  2. 5. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  3. 7. Information technology; technology involving the development, maintenance, and use of computer systems, software, and networks or the processing and distribution of data; Formerly called information systems
  4. 8. Redundant array of independent disks; computer disk configuration that allows one or more disk drives to fail whereas maintaining the integrity of the data they are storing. Failed components may be replaced before they lead to a loss of data
  5. 9. a complex system of interconnected elements.
  6. 11. Central processing unit; hardware component that performs the processing in a computer.
  7. 12. Computer that provides access to a shared file system and/ or increased computing capacity
  8. 13. Virtual private network; utilizes software that provides an authenticated, encrypted connection
  9. 15. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  10. 16. Wide area network; Network of computers (as the Internet) in a large area (as a country or the globe) for sharing resources or exchanging data. Contrast with LAN
  11. 17. Computer or dedicated hardware device that restricts access between a protected network and the internet, or between other sets of networks.
  12. 18. Structured query language; supports commands to create, update, and delete data. Provides the ability to submit both simple and highly sophisticated requests to the database application
Down
  1. 1. a structured set of data held in a computer, especially one that is accessible in various ways.
  2. 2. Uninterruptible power supply; Redundant backup power source used to protect computers in the event of a power surge or temporary power outage
  3. 3. Random access memory; Hardware component in a computer where data and programs are temporarily stored during processing
  4. 4. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  5. 6. The process of encoding electronic data, mating it unintelligible to unauthorized parties; typically involves the use of a key to encode the data in such a way that a unique key is required to decode the data. Keys must be securely communicated between the sender and the recipient.
  6. 10. real-time electronic reporting of anatomic pathology reports
  7. 14. Local area network; Network that operates only within a local area such as an office; Often used for sharing resources such as a printer and file storage devices
  8. 16. type of malware that spreads copies of itself from computer to computer