Telecoms

123456789101112131415161718192021
Across
  1. 4. Serial Advanced Technology Attachment.
  2. 8. volatile memory, stores data regarding frequently accessed programs and processes.(ram)
  3. 11. touch panel that allows you to control a cursor or facilitate navigation through a menu or any graphical interface.
  4. 13. manipulate websites to obtain confidential or private information.
  5. 14. virus that seems harmless but when installed allows remote access to the infected pc from the attacker.
  6. 15. The visual presentation on the indicating device of an instrument.
  7. 16. recordable compact disc (contain a - )
  8. 19. the attacker will pose as a fictitious person to try to steal private information.
  9. 20. reduction of the volume of data that can be processed to represent certain information using less space.
  10. 21. is a printed circuit board to which the components that make up the computer are connected.
Down
  1. 1. Malicious program or code that is harmful to systems.
  2. 2. device that based on stitches and keys allows us to enter information in our pc, to write.
  3. 3. Frames per second.
  4. 5. it is a way to be able to save data of the same type or class.
  5. 6. input peripheral consisting of a lever that rotates on a base and reports its angle or direction to the device it is controlling.
  6. 7. Redundant Array of Independent Disks.
  7. 9. problem that won't allow the system to start.
  8. 10. It is an input device to enter orders to the computer, it is usually designed with two buttons.
  9. 12. this object often called the "brain" of a computer, thanks to its direct plug connection to the motherboard, and communication with all of the computer’s other components.(cpu)
  10. 17. Malicious software that infects your computer or mobile device and collects information about you, your browsing.
  11. 18. It works like an electroacoustic sensor or transducer and converts sound into an electrical signal to increase its intensity, transmit it and record it.