My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

CIS-1150 Final

Across
A type of decision point in an algorithm.
Step by step guide that walks a user through the necessary steps to complete a complicated task.
An object-oriented programming language that has a large set of existing classes.
Component of a database in which the database stores each category of information.
Specific, sequential steps that describe exactly what the computer program must do to complete the required work
A program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission.
An interface through which external devices are connected to the computer.
List of rules that defines in one single location how to display HTML elements.
A non-impact printer known for quick and quiet production and high-quality printouts.
Computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged.
Any laptop or tablet running the Chrome OS as its operating system.
A small segment of data that's bundled for sending over transmission media.
Getting help from another student or from the Internet when taking a quiz or test.
The process of users transferring files between computers.
The process through which you choose which applications are visible on the Windows Start Screen.
Down
Program code made publicly available for free.
A single point that creates the images on a computer monitor.
Process of restarting the system while it is powered on.
A program that attempts to travel between systems through network connections to spread infections.
A cable that transmits data at close to the speed of light along glass or plastic fibers.
Branch of computer science that deals with the attempt to create computers that think like humans.
A small application located on a server; when requested, the applet is downloaded to the client.
Anyone who unlawfully breaks into a computer system.
A text-based approach to documenting an algorithm.
The series of steps a CPU goes through when it performs a program.
Type of Internet harassment where some individual scams others into a false romantic relationship.
Unit of computer storage equal to approximately 1,000 bytes.
Virtual communications gateway or path that enables a computer to organize requests for information from other networks or computers.
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems.
The portion of a domain name that identified who maintains a given website.
Planting malicious code on a computer that alters the browser's ability to find web addresses and that directs users to bogus websites.