Across
- 2. software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
- 4. A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
- 5. is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- 7. a unit of information equal to one billion (109) or, strictly, 230 bits.
- 8. a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
- 10. is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes. ... In computer literature, kilobyte is usually abbreviated as K or KB.
- 12. the way in which something is arranged or set out.
- 13. a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- 14. Basis point refers to a common unit of measure for interest rates and other percentages in finance.
- 16. the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- 17. Is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- 18. the introductory page of a website, typically serving as a table of contents for the site.
- 19. abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier (URI); the generic term for all types of names and addresses that refer to objects on the World Wide Web.
- 20. the process of converting information or data into a code, especially to prevent unauthorized access.
- 21. The Internet's system for converting alphabetic names into numeric IP addresses.
- 22. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Down
- 1. a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.
- 2. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- 3. Java was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network
- 6. to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.
- 9. is an input device that scans documents and images, which can be imported into a computer
- 11. a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
- 15. dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- 18. a person who uses computers to gain unauthorized access to data.
