Share Focus Mode

Technology

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 6. The page that an Internet browser first opens up to. It is usually the starting point of an organisation's or individual's website.
  2. 7. any type of illegal activity that is undertaken (or relies heavily) on a computer.
  3. 9. a device that allows computers to transmit information to each other via ordinary telephone lines.
  4. 10. he software that manages all of a computer's processes and allows programs and applications to run.
  5. 14. the smallest unit of measurement in computing.
  6. 16. a conventional method of transmitting data.
  7. 18. refers to a website's text and information, as opposed to its design and structure.
  8. 19. allow you to limit your search or make it more specific by using words such as "and", "or" and "not".
  9. 21. refers to the number of distinct pixels that make up the display on a computer monitor.
  10. 23. A set of interconnected networks that allow computers in different locations to exchange information.
  11. 24. the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
  12. 28. usually referred to as a computer's "memory" - it stores information used by programs.
  13. 31. refers to resources and services available on the Internet.
  14. 32. refers to unsolicited email messages sent for marketing purposes.
  15. 36. way of sending messages over the internet.
  16. 37. the brains behind your computer.
  17. 39. the most common way of connecting computers on a network with a wired connection. It is a type of local area network (LAN) technology, providing a simple interface for connecting multiple devices.
  18. 43. refers to any software or hardware that acts to assist and improve the functional capabilities of people with disabilities.
  19. 45. A measure of computer processor storage and real and virtual memory.
  20. 46. refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
  21. 48. a document sent with an email message. Many types of files can be sent this way (e.g. Word documents, PDFs, Excel files, JPEGs).
  22. 49. a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider.
Down
  1. 1. set of computers on a network that are managed as a unit.
  2. 2. barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
  3. 3. the reduction of the size of a file.
  4. 4. a component that adds to a software program's functionality.
  5. 5. a standard or set of rules that computers and other devices use when communicating with one another.
  6. 8. a small program that allows a peripheral device such as a printer or scanner to connect to your PC.
  7. 11. a document sent with an email message.
  8. 12. refers to the part of an application that performs an essential task not apparent to the user.
  9. 13. to load and initialise the operating system on a computer.
  10. 14. a type of communications technology whereby a single wire can carry more than one type of signal at once.
  11. 15. a conventional method of transmitting data. Standard landline telephones use analogue technology. It is distinct from digital technology, which provides for greater quality and speed of data transmission.
  12. 17. it is temporarily stored on your computer.
  13. 20. the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
  14. 22. enables a computer user to search information on the Internet. It is a type of software that creates indexes of databases or Internet sites based on the titles of files, keywords, or the full text of files.
  15. 25. A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences.
  16. 26. is a piece of programming code inserted into other programming to cause damage.
  17. 27. refers to measures designed to protect your computer, device or network.
  18. 29. programming language that is commonly used in the development of client-server web applications.
  19. 30. a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as "favourites."
  20. 33. the brains of your computer. It is responsible for performing calculations and tasks that make programs work.
  21. 34. A point within a network that interconnects with other networks.
  22. 35. refers to the storing and accessing of data and programs over the Internet instead of on another type of hard drive.
  23. 38. a wireless communications technology intended to replace cables.
  24. 40. a software program that allows you to surf the web.
  25. 41. the unit used to measure the speed of a computer's processor
  26. 42. short for malicious software. It refers to a software program that has been developed to do harm to other computers.
  27. 44. a microprocessor that performs many functions and calculations that make your computer run.
  28. 47. software that allows you to view a PDF document (a document that can be seen but not changed). It can be downloaded free of charge from Adobe.
  29. 50. The physical place where a computer stores information - applications and files.