Shelby County Government Information Technology Services

123456789101112131415161718192021222324252627282930
Across
  1. 2. A name that identifies a wireless network.
  2. 4. Any software that covertly gathers user information, usually for advertising purposes, through the user's Internet connection.
  3. 7. A set of rules that regulate how computers exchange information.
  4. 11. Physical components of a computer including the keyboard, monitor, disk drive, etc.
  5. 13. Group/Team that uses code to create software and websites.
  6. 16. A name used in conjunction with a password to gain access to a computer system or a network service.
  7. 17. A group of interconnected computers capable of exchanging information.
  8. 19. A computer that is responsible for responding to requests made by a client program.
  9. 20. A device used for connecting two Local Area Networks (LANs).
  10. 24. Allows wireless-equipped computers and other devices to communicate with a wired network.
  11. 26. Any program that performs a specific function. Examples: word processing, spreadsheet calculations, or electronic mail.
  12. 27. A con that scammers use to electronically collect personal information from unsuspecting users.
  13. 28. A combination of keyboard characters meant to represent a facial expression.
  14. 29. Group that provides the framework for all services.
  15. 30. Information and assistance resource that troubleshoots problems with computers or similar products.
Down
  1. 1. The best school in Shelby County.
  2. 3. A collection of information organized so that a computer application can quickly access selected information.
  3. 5. Office that supports and manages projects.
  4. 6. A general purpose programming language commonly used in conjunction with web pages that feature animation.
  5. 8. A facility used to house computer systems and associated components.
  6. 9. Group that ensures the safety of the environment and data.
  7. 10. Group that is the first line of service with the customer.
  8. 12. Junk email or unsolicited bulk email.
  9. 14. Process of identifying yourself and the verification that you're who you say you are.
  10. 15. A secret combination of characters used to access a secured resource.
  11. 18. Hardware and/or software method of preventing unauthorized access to or from a particular network.
  12. 21. Manipulation of data to prevent accurate interpretation by all but those for whom the data is intended.
  13. 22. Wireless networking technology via radio waves.
  14. 23. Real-time communication between two or more users via networked-connected computers.
  15. 25. Mayor of Shelby County.