Vocab Test 9R Crossword
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
                          
 
 
Down: 1) All computers need a set of instructions to follow in order to run or even boot up. These instructions are called "software code" or just "software" for short. A group of instructions that together perform a specific task is called a "software program". Software programs are stored either as files on devices such as hard disks or as permanent instructions burned into non-volatile memory such as ROM chips. Software is initially written in a person-friendly computer language such as C, Java, FORTRAN and so on. A compiler and linker converts those lines of instructions into machine code the computer can understand. There are different classes or types of software depending on what it does. For example, "Driver Software" controls hardware devices such as hard disks and printers. "Application Software" examples include word processors and spreadsheets. "Utility Software" examples includes file compression and disk defragmentation programs3) A thumbnail is a small version of an image. It allows you to view the image without having to open it, which if it is a large file, could take time. The thumbnail is linked to the larger image, so if you click on it, the larger image will automatically open. Thumbnails are useful when you want to quickly view a large number of images which are available.4) Shareware is computer software that is distributed for free on a trial basis on the understanding that if you want to continue to use the software after the trial is over e.g. 30 days, then you will voluntarily send the author of the software a small payment.5) A video, film and animation term. Video works by displaying a single image for a very brief time, then it displays another single image for an equally brief time and so on. Each image is called a 'frame'. The 'frame rate' is describing how many images are displayed per second. Cinema film work at 24 frames per second. This is fast enough to create the illusion that you are seeing moving images. In Flash - Adobe's animation tool, you can set the frame rate from the 'Document Properties'.8) Computer programs normally follow from one instruction after another and carry on working through them in sequence. This is fine if nothing else is happening. But if something happens which the CPU needs to deal with at that instant, such as a mouse movement, or a keyboard input, engineers have built a system into the microprocessor to deal with these events and have called them an 'interrupt'. An interrupt will signal to the software currently running, to break off from what it is doing and to handle the interrupt instead. When the task is complete, the software jumps back to the instruction it was working on before being interrupted and carries on again from that point.10) Hardware is used to describe the physical parts of the computer which you can touch. Examples include monitors, keyboards, printers, hard disk, wiring, CPU etc.11) The wizard facility assists the user in the production of a document. It is an automatic creation of preset templates using guidance from the user. The information is inserted into the wizard when the user answers the questions asked displayed on a range of screens. Once all the information has been entered the wizard is closed and the user is presented with the completed document containing the information in the pre-set format. It enables users make the best use of the available facilities and to use complex features of software programs which they wouldn't be able to do otherwise.13) Youtube is a website that you can video yourself and upload it to the website for the world to see.14) This is short for Hyper Text Markup Language. HTML is a coding language which was developed in order to lay out (markup) web pages. HTML is made up of a series of 'tags' that tell the Web browser how to display the text and images on a web page.20) A short term for Compact-Disk Read only. Also called a CDROM, Compact Disk Read Only Memory. You can write data onto a CD-R only once. It can store about 680 Mb of data. Across: 2) The term 'zoom in' means to enlarge an image or document so that it becomes easier to work on. You can see less of the document on the screen at any one time but the area that you can see is larger and clearer. The term 'zoom out' means to decrease the size of an image or document on the screen so that you can see less detail but you can see more of the overall item.6) A database enables the effective storage of data in a logical and structured way. - Databases can be computerised or paper-based. - A large collection of data items and links between them, structured in a way that allows it to be accessed by a number of different applications programs. - It is also used to describe any collection of data7) This stands for 'Joint Photographic Experts Group'. JPEG is a common format used for images. It compresses the image size by deleting information that it considers unnecessary. This means that some of the image quality is sacrificed for a smaller file size. Suitable for photographic images.9) An e-commerce example. Traditionally, if you wanted to deal with a Bank, you would have to go to a branch office on the high street, but the banks quite quickly realised that a lot of what customers want to do can be done over the internet. For example, checking your bank balance, moving money between accounts, paying a bill can all be done from your computer logged into the Bank's web server. It is vital that all this interaction is kept secret from anyone eavesdropping on the internet connection. So very strong encryption called SSL is used. Also, many banks have multiple steps to log into the account such as a password and then asking for random letters from a phrase you have set up. This stops tricks like keyloggers from recording your complete login details. But con-artists are still trying their best to trick you into telling them your details by using 'phishing' scams, such as sending a fake email warning you to 'update your security settings'. Nearly all the main Banks now have an online presence. This is great for customer convenience and also good for them as it reduces the need to have so many branches.12) A computer keyboard is an input device that enables the user to enter characters (letters, numbers and symbols) into a computer. The keyboard consists of rows of keys with each key representing a different character. There are different types of keyboards available, for example, QWERTY keyboards, ergonomic keyboards, braille keyboards.15) Input Processing Output In the last stage, the information needs to be presented to the user in some way. An OUTPUT device will present information in a variety of ways. For example A printer will output text and images. Audio Speakers will output sound music and speech Monitor will present moving images (you are looking at one right now) Plotters will draw diagrams (useful for architects) Projectors will display the computer screen on a wall (handy for meetings)16) In order to log onto a network, you need a User ID and a password. Your User ID identifies you to the network, it enables the server to retrieve your files and it defines your access rights. Your User ID does not need to be kept a secret. Your password is the second part of the log-on security. It identifies that you are the person to whom the User ID belongs. It must be kept a secret. Your password should be kept secure at all times, never written down or given out to other people. If others know your password, they can access your personal area on the network and read, alter or delete your files. Passwords should be carefully chosen. They should not be something which is easily associated with you and could be guessed e.g. your favourite football team or your dog's name. They should contain a mixture of letters, numbers and symbols. This makes it difficult for special password cracking software to identify your password. You should change your password regularly e.g. every month and if you think someone has found it out, you should change it immediately.17) A Utility is a piece of software that performs a specific and useful task, for example compressing files, defragmenting the hard disk. Many Utilities come as part of the Operating System.18) A query is a request for information from a database which matches a set of criteria. You use queries all the time when you use a search engine such as Google. You type in the term that you want some information about and click 'search'. The search engine looks through its database and displays a list of results which match the term that you used.19) Hacking means to illegally access other people's computer systems in order to destroy, disrupt or carry out something illegal. Hacking is usually carried out remotely, i.e. someone outside a company wants to try to break into the computer system. Even if the hacker only does it as a challenge or for a bit of fun, it is still illegal.
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type