Across
- 2. the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- 4. send the same message indiscriminately to (large numbers of recipients) on the Internet.
- 6. portable computer
- 9. A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.
- 11. study/use of systems for storing, retrieving, and sending info.
- 12. a cellular phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded applications.
- 13. computer networking device that connects devices together on a computer network
- 15. gives instructions the computer needs to operate
- 16. software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- 19. lets the user to complete tasks such as create documents , Spreadsheets, databases, and publications
- 20. common connection point for devices in a network
Down
- 1. a summary
- 3. Partitions are drives meaning it shows up as one drive on the windows
- 5. networking device that forwards data packets between computer networks
- 7. To open a list of keyboard shortcuts in Google Docs, press Ctrl + / (Windows, Chrome OS) or ⌘ + / (Mac). You can also use menu accesskeys.
- 8. created when two or more PCs are connected and share resources without going through a separate server computer
- 10. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 14. connects to local systems and controls the passing info.
- 17. Point networking hardware allows Wi-Fi compliant device to connect to a wired network
- 18. desktop computer terminal, more powerful than personal computer