Across
- 1. Is a technology that automatically provides users with updated content from many different sites (abbreviation)
- 4. Device that connects computers in a network with cables, to enable communication between them (but not used for internet access)
- 6. Allows you to control which programs can access the internet; protects your computer or network from unauthorised access
- 7. An upgrade on WiFi and a more secure wireless networking technology that allows wireless devices to communicate with one another
- 9. Includes the spreading of rumours, gossip and the general bullying of another person using digital communication methods (2 words)
- 11. A place where a WiFi network has been created so that people can connect to the network
- 13. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- 16. Getting the latest 'bug fixes' or obtaining new features
- 19. Where computer resources are used without permission, or for tasks not authorised by the owner of the computer (2 words)
- 20. Connecting to your bank via the internet to perform online transactions (2 words)
- 21. A wireless networking technology using radio waves to provide internet access
- 22. A type of cabling that transmits data as pulses of light through thin strands of glass or plastic
- 24. Generally, the minimum hardware requirements needed to run the software (2 words)
- 28. Online publishing tools
- 30. Any type of business transaction that involves communication across the internet
- 31. Any online environment that allows people to 'chat' in real time (2 words)
- 32. 'Free' software that is ad-sponsored and pops up adverts while the program is running
- 33. Error in the program caused by the way it was written (2 words)
- 34. Allows two or more people to hold online conferences at different locations (2 words)
Down
- 2. where likes, dislikes, interests, photographs, etc. can be posted for friends to see and read (3 words)
- 3. The use of deception to manipulate or 'con' someone into giving out confidential information (such as a password or account number) or into giving access to their computer or premises (2 words)
- 4. Usually relate to the type of operating system, e.g. Linux or macOS versus Windows, and the version needed (2 words)
- 5. Refers to centralising and automating or 'computerising' all tasks and systems in the office (2 words)
- 8. Connects computer to a cabled network, allows computer to communicate with the network
- 10. Network which connects computers in a small area such as a school
- 12. Any technique or software that tries to monitor and track the way you use your computer, and then report this information to a third party
- 14. Software that runs on internet servers - interface viewed in web browser (2 words)
- 15. Is usually carried out by an individual who is obsessed with someone (2 words)
- 17. outlines rights and responsibilities of network users (abbreviation)
- 18. Web-based word processor, presentation and spreadsheet applications (2 words)
- 19. Computing devices that use network resources
- 20. Organisation's private network (abbreviation)
- 23. The protocol (rule for communication) used for the fast, easy transfer of files between remote computers that have an internet connection (abbreviation)
- 25. Cable that is easy and cheap to install (abbreviation)
- 26. A type of malware that encrypts your files or locks your device, making them inaccessible until a ransom is paid to the attacker (2 words)
- 27. Powerful computers that provide resources
- 29. A technology that allows telephone calls to be made over LANs, WANs and the internet (abbreviation)
