Technology

12345678910111213
Across
  1. 1. The computing part of the computer. Also called the "processor," it is made up of the control unit and ALU.
  2. 3. it is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords. Also known as "brand spoofing," an official-looking e-mail is sent to potential victims pretending to be from their bank or retail establishment.
  3. 9. Instructions for the computer. A series of instructions that performs a particular task is called a "program." The two major software categories are "system ________" and "application ________."
  4. 10. An inhouse website that serves employees only, and most medium-sized and large companies have one. Although intranet pages may have links to websites on the Internet, the _________ is not exposed to, or is accessed by, the general public.
  5. 11. Computer people may use the term for capability and time. For example, "not enough _______ to get the job done" means not enough staff or time to do it.
  6. 12. A small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk. ________ provide a way for the website to recognize you and keep track of your preferences.
  7. 13. The address that defines the route to a file on an Internet server (Web server, mail server, etc.). ___s are typed into a Web browser to access Web pages and files.
Down
  1. 1. Reserved areas of memory in every computer that are used to speed up instruction execution, data retrieval and data updating.
  2. 2. An organization that provides access to the Internet. Connection to the user is typically via DSL, cable or FiOS; however, ____ can deliver service via satellite, dial-up, ISDN, private lines and wireless.
  3. 4. a global network made up of smaller networks
  4. 5. The fundamental display element of an electronic screen or bitmapped image.
  5. 6. To write and post an entry in a website called a weblog
  6. 7. Machinery and equipment (CPUs, drives, keyboards, printers, scanners, cables, etc.). In operation, a computer is both ________ and software, and one is useless without the other.
  7. 8. The primary method for keeping a computer secure from intruders. A ______ allows or blocks traffic into and out of a private network or the user's computer. _____ are widely used to give users secure access to the Internet as well as to separate a company's public Web server from its internal network.
  8. 13. The most widely used hardware interface for attaching peripherals to a computer. There are at least two ____ ports on laptops and four on desktop computers