Technology

123456789101112
Across
  1. 5. process of converting data into a secret code for transmission over a public network.
  2. 6. usually consists of eight bits.
  3. 7. isa plug-and-play interface that allows a computer to communicate with peripheral and other devices.
  4. 9. a person who posts inflammatory comments or messages in an online community such as a forum, chatroom,blog or on social networking sites.
  5. 10. the act of trying to access someone's information illegally.
  6. 12. rate at which a processor can complete a processing cycle.
Down
  1. 1. what is a network secruity system used to stop unauthorised access.
  2. 2. a device that feeds data into a computer, such as keyboard or mouse.
  3. 3. sending an email, posting photos on a social media site and using your webcam.
  4. 4. Data sent to your computer by a web server that records your actions on a certain web site
  5. 8. a web address.
  6. 11. type of text style and size.