CompSci
Across
- 4. best encryption to keep the data on a laptop safe if the laptop is lost or stolen
- 10. For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. What is this an example of?
- 11. security concern that is a threat to confidentiality
- 13. A wireless communication that requires devices to be within 6in of each other to transfer information
- 14. prevents malware sent as compromised file via email from infecting a person's computer
- 15. A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. What does the workstation MOST likely need for the printer to function?
Down
- 1. reusable component of a program
- 2. technician is called to replace a display for a workstation. Which is most likely be used to connect the display to the workstation?
- 3. An employee is asked to generate a report on a student info system. He uses spreadsheet software & connects to a remote database to pull the data. Which types of application architectures did the employee use?
- 5. email transfer protocol
- 6. Network protocols likely to be used when sending and receiving Internet email
- 7. used to represent international text data?
- 8. Which operating system does not require extensions on files to execute a program?
- 9. A database administrator finds that a table is not needed in a relational database. Which command is used to completely remove the table and its data?
- 12. operating system that does not require extensions on files to execute a program