Technology Terms 1

123456789101112131415161718192021
Across
  1. 1. is a keyboard key that performs a special function not included with the traditional 104-key keyboard.
  2. 3. is used to send the cursor to the next line or execute a command or operation.
  3. 4. is sometimes necessary to recover from an error, or to re-initialize drivers or hardware devices.
  4. 6. a display screen for video images and casing that holds it.
  5. 7. is a portable storage device.
  6. 11. is a keyboard key that deletes any character before the cursors current position.
  7. 13. is the act of turning on a computer, computer peripheral, or other electrical device.
  8. 16. is a term used to describe the process of a programmer developing a software program.
  9. 17. is a key located on the top-left of a computer keyboard that allows a user to cancel or abort operations.
  10. 18. contains billions of web pages created by people and companies from around the world, making it a limitless place to locate information and entertainment.
  11. 20. is used to send the cursor to the next line or execute a command or operation.
  12. 21. allows an individual to control a pointer in a graphical user interface (GUI) and manipulate on-screen objects such as icons, files, and folders.
Down
  1. 2. is one of the primary input devices used with a computer that looks similar to those found on electric typewriters, but with some additional keys.
  2. 5. consists of billions of pages linked to each other that contain text, graphics, multimedia files, and other interactive software.
  3. 8. Term used to describe the row of keys on the computer keyboard your fingers rest on when not typing.
  4. 9. A long horizontal key on the lower edge of a keyboard that is always the largest key on the keyboard.
  5. 10. is an internal hardware component that supplies components in a computer with power.
  6. 12. are electronic devices that accept data (input), process that data, produce output, and then store (storage) the results.
  7. 14. is a set of credentials used to gain access to an area that requires proper authorization.
  8. 15. is an external hardware device responsible for taking computer data and generating a hard copy of that data.
  9. 19. is a list of commands or choices offered to the user.