STORAGE , MEMORY AND PROCESSING DEVICES AND NETWORK, INTERNET TECHNOLOGIES

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051
Across
  1. 3. Over time, the files on your computer’s hard drive become scattered, making your computer slower.
  2. 5. Is also called the processor, carries out the instructions of a computer program. It is, basically, the “brain” of the computer and does the arithmetical, logical and input/output operations of a computer program.
  3. 7. Auxiliary memory, this type of storage holds data for the long term.
  4. 13. Big data from several sources has helped travel agencies, hotels and the tourism industry better understand what customers are looking for and this has led to more direct reservations.
  5. 16. Is when someone gains access to a network using someone else’s credentials or through other illegal methods.
  6. 17. Are a unique identifier given to any person who uses a secure computer network.
  7. 20. Is a small network of computers covering a small area, such as an office building or school.
  8. 26. Are the most basic form of network security. At their core, are a secret string of letters, numbers and symbols created by users or generated by a computer to limit or restrict access to a system.
  9. 28. Is virtually unlimited in size. This means that there is plenty of space for you to back up your entire hard drive, including all of your purchased programs, music, photos, and files. Saving to the cloud means that you are saving to hard drives in a remote location.
  10. 29. Is usually the basic computing unit of the CPU.
  11. 30. Is another important aspect of database security. It means that the data can only be accessed by people who have the correct permissions to view it. This can be done by making sure that access to the data is controlled.
  12. 32. Can be done manually or be programmed to happen automatically with appropriate software.
  13. 34. Means preparing a disk to store data.
  14. 36. Is a massive network of networks with millions of computers connected to each other across the globe. All of these computers can communicate with each other as long as they are connected.
  15. 37. Is a private, web-based network that is only available to an organization’s staff.
  16. 39. Needs power to keep its contents (volatile).
  17. 43. Tool that will delete the deleted files and folders in the recycle bin.
  18. 44. Is the most important aspect of database security. People should be able to trust that any information about them that is stored is safe and secure.
  19. 45. Works to protect your personal information from unwanted access. You can protect your computer by setting up a username and password that you will need to enter each time you start it up.
  20. 46. The process of making copies of data or data files to use in the event the original data or data files are lost or destroyed or storing the copies in a different place from where you keep your computer.
  21. 47. Holds programs and data more permanently.
  22. 48. Is the long-term storage of information that will be used in future.
  23. 49. Is the most common example of secondary storage inside a computer.
  24. 50. The RAM in a computer is an example of it. This means that data is not stored permanently but is kept for short-term use only. The data is cleared as soon as the power to the RAM is stopped.
  25. 51. Main or internal memory of the computer.
Down
  1. 1. Refers to a range of software aimed at the design, implementation and operation of computer networks.
  2. 2. Are cheap and relatively easy to use. There are no moving parts, so they are an excellent way to move data around. However, they can be slow and unreliable.
  3. 4. Read-only memory, stores the basic instructions for what needs to happen when the computer is switched on.
  4. 6. You also have a responsibility to make sure that you do not expose a network you are using to attacks.
  5. 8. The unit for the measurement of CPU speed.
  6. 9. Mainly uses the system components of the computer, such as the motherboard, CPU and RAM, for its tasks.
  7. 10. On a computer, for example, a user may only have access to a personal folder where they can open, read, write, create and delete files and folders. A user with administrative rights can access all the files and folders on a computer and can make changes that will affect all users.
  8. 11. Users share photographs, personal data and make comments on posts by other users. This information is used by it to provides users with personalised content and also to assist advertisers to hyper-target users.
  9. 12. Connect to an internet service provider (ISP) to give internet access.
  10. 14. Is an example of volatile memory.
  11. 15. Are the computers connected to the network. They are used by people to carry out tasks, for example the accountant who creates spreadsheets or the designer who designs websites.
  12. 18. Is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, office building etc.
  13. 19. Are pieces of hardware that allow a computer to connect to a network. Most modern computers have this device integrated into their motherboards, but NICs can also be purchased separately.
  14. 21. One of its purpose is to back up or archive your important data.
  15. 22. Allow multiple computers to connect to the network, but not necessarily the internet they guide the traffic on the network.
  16. 23. Means that the databases should be up and running when users need to access them. This means that any downtime should be scheduled and if there is unexpected downtime, database administrators should check that this is not due to a security breach.
  17. 24. Can help detect and fix errors in USB flash drives, hard drives and SSDs.
  18. 25. Is one of the most essential parts of a computer.
  19. 27. Have no moving parts and are more expensive than hard drives and the storage space is limited due to the cost.
  20. 31. Proper analysis of big data can help detect any and all the illegal activities that are being carried out, like the misuse of credit cards, misuse of debit cards, customer statistics alteration and money laundering.
  21. 33. made up of several twisted pairs of wires inside a plastic casing and have a connector on either end called an RJ45 connector, which plugs into network ports on the various devices.
  22. 35. Are devices that are used to set up a WLAN in a large building such as an office or school. They allow wireless devices such as smartphones to connect to the network.
  23. 38. Has a very large storage capacity (up to 180 TB), but can be destroyed very easily and the data can be lost.
  24. 40. Mechanical stress can shorten its lifespan.
  25. 41. Big data that is being collected is related to the students, faculties, courses and results. This can provide insights to improve the effectiveness of educational institutes.
  26. 42. Are small devices that act as a controller for the networked devices to communicate they create the network.