Across
- 2. This is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access. A common misconception is that it's term is short for "wireless fidelity,"
- 3. A hardware which connects to a computer, broadband network or wireless router.
- 6. It is any internal or external equipment or devices you can use perform major functions such as input, storage, processing, communication, output, connection and more.
- 10. A program that, after being initially loaded into the computer by a boot program, and manages all of the other application programs in a computer.
- 12. This is a computer network that links devices within a building or group of adjacent buildings.
- 13. A structured set of data held in a computer, especially one that is accessible in various ways
- 14. This is a convenient computer that is more useful and is almost as powerful as a desktop computer. Desktop Computers can run on batteries , Ac power, chargers, and many more.
- 15. An external serial bus interface standard for connecting peripheral devices to a computer,
- 17. When you accept them on a website, they send all your info to that website.
- 21. This is a device that can be used for computer data. This can be used to store school work, videos, memories and much more.
- 24. This is a global computer network providing a huge variety of info
- 25. This is when someone uses the internet in a safe and legal way such as no hacking, illegally downloading or damaging of people work.
Down
- 1. In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 4. A new type of computer designed to help you get things done faster and easier.
- 5. This is a video camera that is connected to a device and allows videos and images to be online.
- 7. A common computing acronym that stands for random-access memory. Sometimes it's called PC memory or just memory.
- 8. A device that forwards data packets to the appropriate parts of a computer network.
- 9. Someone that creates a fake online identity to use the victim for money.
- 11. This is a device that has many apps that people use in general, and for business, such as the market, clothing stores,
- 16. This is a web-based tool that enables users to locate information on the World Wide Web. Popular examples of this is Google and Yahoo!
- 18. This is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer.
- 19. This is a sequence of characters or encoded information identifying when a certain event occurred, usually giving date and time of day, sometimes accurate to a small fraction of a second.
- 20. This is a peripheral device that enables a user to input text into a computer or any other electronic machinery. This is an input device and is the most basic way for the user to communicate with a computer.
- 22. This is simply a new way of storing files and other digital content. It allows users to access the files wherever there is Internet access.
- 23. This is a social engineering attack used to steal somebody's personal information such as passwords or credit card information.
