1:00
en
CR
IGCSE ICT MEGA CROSSWORD
31
Firewall: This prevents unauthorised access to your computer
Encrypting: translating data into a code so that it makes no apparent sense
teleworking: working from home using IT to keep in touch with your company
Virus: A program written to cause harm to a computer
microprocessor: An integrated circuit which contains the processor of a computer all on one tiny chip
hacking: gaining unauthorised access to computer systems
antivirus software: it inspects computer files and email attachments for viruses and removes or quarantines any that it finds
China: Which country heavily censors what their citizens can access on the internet
PDA: a small handheld computer
Programming: manipulating data
Smartphone: an advanced mobile phone
Software: another name for programs
Storage: a component of a computer where data and programs are saved
Touchscreen: part of the component that allows you to use your computer without a keyboard or mouse
WiFi: a term used to identify wireless environments
Appications: software that will carry out specific tasks on a computer such as word processing or using a database
OperatingSystem: a systems software program that controls the entire operation of the computer as well as allowing interaction with the user
PeripheralDevices: Other devices that is separated from a computer's CPU.
Programs: a complete set of instructions that can be executed in order to carry out task
GPS: provides location and time information in all weather, anywhere on or
Utility: the name given to software such as operating systems and programs that
CPU: the hardware within a computer system which carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system
InputDevice: a piece of hardware used to put data in the computer
OutputDevice: a piece of hardware used to get data from the computer
RAM: is a form of computer data storage, volatile, and have a large storage
ROM: is a class of storage medium used in computers and other electronic devices
GUI: The type of user interface where the user controls the operation of the computer by using a pointing device to select icons on screen.
Icons: A small graphic or logo representing a piece of software, a particular command or function or a brand.
User Interface: The way in which the user and the computer interact.
WIMP: A type of GUI.
Window: A temporary area opened on screen displaying the activity if a program. There can be several windows on a screen at any once a time.
WAN: A global network allowing anyone connected to it to access information located anywhere else across the network, provided they have permission.
Serif: A font face style, which has a small finishing stroke (serif) attached to the ends of characters, e.g. Times New Roman, Perpetua.
IGCSE ICT MEGA CROSSWORD
Across:| 2. | A font face style, which has a small finishing stroke (serif) attached to the ends of characters, e.g. Times New Roman, Perpetua. | | 5. | software that will carry out specific tasks on a computer such as word processing or using a database | | 7. | A temporary area opened on screen displaying the activity if a program. There can be several windows on a screen at any once a time. | | 10. | A small graphic or logo representing a piece of software, a particular command or function or a brand. | | 11. | manipulating data | | 12. | A program written to cause harm to a computer | | 17. | an advanced mobile phone | | 18. | gaining unauthorised access to computer systems | | 20. | a piece of hardware used to get data from the computer | | 23. | is a form of computer data storage, volatile, and have a large storage | | 24. | a piece of hardware used to put data in the computer | | 25. | This prevents unauthorised access to your computer | | 27. | part of the component that allows you to use your computer without a keyboard or mouse | | 28. | The type of user interface where the user controls the operation of the computer by using a pointing device to select icons on screen. | | 29. | another name for programs | | 31. | The way in which the user and the computer interact. |
| | Down:| 1. | a term used to identify wireless environments | | 3. | it inspects computer files and email attachments for viruses and removes or quarantines any that it finds | | 4. | a component of a computer where data and programs are saved | | 6. | Which country heavily censors what their citizens can access on the internet | | 8. | a systems software program that controls the entire operation of the computer as well as allowing interaction with the user | | 9. | An integrated circuit which contains the processor of a computer all on one tiny chip | | 13. | translating data into a code so that it makes no apparent sense | | 14. | is a class of storage medium used in computers and other electronic devices | | 15. | provides location and time information in all weather, anywhere on or | | 16. | A type of GUI. | | 19. | the hardware within a computer system which carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system | | 21. | the name given to software such as operating systems and programs that | | 22. | a small handheld computer | | 26. | a complete set of instructions that can be executed in order to carry out task | | 30. | A global network allowing anyone connected to it to access information located anywhere else across the network, provided they have permission. |
| |
© 2013
PuzzleFast.com, Noncommercial Use Only
IGCSE ICT MEGA CROSSWORD
Across:| 2. | A font face style, which has a small finishing stroke (serif) attached to the ends of characters, e.g. Times New Roman, Perpetua. | | 5. | software that will carry out specific tasks on a computer such as word processing or using a database | | 7. | A temporary area opened on screen displaying the activity if a program. There can be several windows on a screen at any once a time. | | 10. | A small graphic or logo representing a piece of software, a particular command or function or a brand. | | 11. | manipulating data | | 12. | A program written to cause harm to a computer | | 17. | an advanced mobile phone | | 18. | gaining unauthorised access to computer systems | | 20. | a piece of hardware used to get data from the computer | | 23. | is a form of computer data storage, volatile, and have a large storage | | 24. | a piece of hardware used to put data in the computer | | 25. | This prevents unauthorised access to your computer | | 27. | part of the component that allows you to use your computer without a keyboard or mouse | | 28. | The type of user interface where the user controls the operation of the computer by using a pointing device to select icons on screen. | | 29. | another name for programs | | 31. | The way in which the user and the computer interact. |
| | Down:| 1. | a term used to identify wireless environments | | 3. | it inspects computer files and email attachments for viruses and removes or quarantines any that it finds | | 4. | a component of a computer where data and programs are saved | | 6. | Which country heavily censors what their citizens can access on the internet | | 8. | a systems software program that controls the entire operation of the computer as well as allowing interaction with the user | | 9. | An integrated circuit which contains the processor of a computer all on one tiny chip | | 13. | translating data into a code so that it makes no apparent sense | | 14. | is a class of storage medium used in computers and other electronic devices | | 15. | provides location and time information in all weather, anywhere on or | | 16. | A type of GUI. | | 19. | the hardware within a computer system which carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system | | 21. | the name given to software such as operating systems and programs that | | 22. | a small handheld computer | | 26. | a complete set of instructions that can be executed in order to carry out task | | 30. | A global network allowing anyone connected to it to access information located anywhere else across the network, provided they have permission. |
| |
© 2013
PuzzleFast.com, Noncommercial Use Only