|
"CGS 1060C Introduction to Computers": HTML5 Crossword |
Across2. 12. ____ permissions provide registered users with access to the files they need while restricting access to private resources (4)
3. 6. Google Docs is classified as ____ software, which allows users to share and edit a document in real time on the web (13)
5. 14. The most popular search engines use ____ to store information about webpages (8)
8. 10. What is a realistic way to promote Internet security (6,6,9,3,6,4,9)
9. 4. _____ uses glasses that allow the wearer to see the real world with computer-generated objects overlaid across the scene (7,7)
11. 3. The term _____ best describes the level of technology skills needed in today’s business world (8,7)
|
|
Down1. 18. The biggest challenge posed by Big Data is ____ (10,8,2,7,3,7,6,2,4)
4. 5. A CPU component known as the _____ carries out the instructions used for mathematical and logical operations (7,4)
6. 8. When you combine a system’s hardware configuration and operating system, it is sometimes called the computer’s ____ (8,8)
7. 17. The ____ bill demonstrated the conflict between Internet snooping and Internet user privacy (4)
8. 19. When choosing a cellular phone service, you should consider the ____ (7,4)
10. 7. ____ refers to the electronic instructions that govern a computer’s actions in order to provide a computing service (8)
11. 15. An Internet-based crime is referred to as a(n) ____ crime (5)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
2. 12. ____ permissions provide registered users with access to the files they need while restricting access to private resources (4)
3. 6. Google Docs is classified as ____ software, which allows users to share and edit a document in real time on the web (13)
5. 14. The most popular search engines use ____ to store information about webpages (8)
8. 10. What is a realistic way to promote Internet security (6,6,9,3,6,4,9)
9. 4. _____ uses glasses that allow the wearer to see the real world with computer-generated objects overlaid across the scene (7,7)
11. 3. The term _____ best describes the level of technology skills needed in today’s business world (8,7)
DOWN
1. 18. The biggest challenge posed by Big Data is ____ (10,8,2,7,3,7,6,2,4)
4. 5. A CPU component known as the _____ carries out the instructions used for mathematical and logical operations (7,4)
6. 8. When you combine a system’s hardware configuration and operating system, it is sometimes called the computer’s ____ (8,8)
7. 17. The ____ bill demonstrated the conflict between Internet snooping and Internet user privacy (4)
8. 19. When choosing a cellular phone service, you should consider the ____ (7,4)
10. 7. ____ refers to the electronic instructions that govern a computer’s actions in order to provide a computing service (8)
11. 15. An Internet-based crime is referred to as a(n) ____ crime (5)

|