Technology Vocab

123456789101112131415161718
Across
  1. 1. the rules of etiquette that apply when communicating over computer networks, especially the internet.
  2. 5. a secret word or expression used by authorized persons to prove their right to access, information, etc.
  3. 8. a very small, portable, solid-state hard drive that can be inserted into a USB port for storage and retrieval of data.
  4. 9. formal permission from a governmental or other constituted authority to do something, as to carry on some business or profession.
  5. 11. the body of information about an individual, organization or electronic device that exists online.
  6. 12. a part of a mechanical or electrical system
  7. 14. acceptable use policy
  8. 15. a website that allows users to add, delete, or revise content by using a web browser
  9. 16. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
  10. 18. formal permission from a governmental or other constituted authority to do something, as to carry on some business or profession.
Down
  1. 1. a set of technologies that protects the usability and integrity of a company's infrastructure by preventing the entry or proliferation within a network of a wide variety of potential threats.
  2. 2. an external serial bus interface standard for connecting peripheral devices to a computer, as in a USB port or USB cable.
  3. 3. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.: works granted such right by law on are protected for the lifetime of an author or creator and for a period of 70 years after their death.
  4. 4. a copyright doctrine that enables the legitimate use of copyrighted materials
  5. 6. a website containing a writer's or group of writers' own experiences, observations, opinions, etc., and often having images and links to other websites.
  6. 7. a device or unit that operates separately from the CPU but is connected to it, as a mouse, printer, speakers, etc
  7. 10. disruptive online messages, especially commercial messages posted on a computer network or sent as email (often used attributively)
  8. 13. a piece of writing or other work reflecting such unauthorized use or imitation:
  9. 17. wide area network
  10. 18. local area network