CompSci

123456789101112131415
Across
  1. 4. best encryption to keep the data on a laptop safe if the laptop is lost or stolen
  2. 10. For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. What is this an example of?
  3. 11. security concern that is a threat to confidentiality
  4. 13. A wireless communication that requires devices to be within 6in of each other to transfer information
  5. 14. prevents malware sent as compromised file via email from infecting a person's computer
  6. 15. A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. What does the workstation MOST likely need for the printer to function?
Down
  1. 1. reusable component of a program
  2. 2. technician is called to replace a display for a workstation. Which is most likely be used to connect the display to the workstation?
  3. 3. An employee is asked to generate a report on a student info system. He uses spreadsheet software & connects to a remote database to pull the data. Which types of application architectures did the employee use?
  4. 5. email transfer protocol
  5. 6. Network protocols likely to be used when sending and receiving Internet email
  6. 7. used to represent international text data?
  7. 8. Which operating system does not require extensions on files to execute a program?
  8. 9. A database administrator finds that a table is not needed in a relational database. Which command is used to completely remove the table and its data?
  9. 12. operating system that does not require extensions on files to execute a program