Computer Management and safe-guarding our data

1234567891011121314151617181920
Across
  1. 2. 6. This is a form of malware. It can cause relatively minor, annoying problems such as redirecting you to websites you don’t intend going to. (7)
  2. 3. 8. Name another word for ‘fishing for information’ (8)
  3. 6. 7. A collection of programs that are designed to infiltrate a computer and gain the highest levels of privileges(administrator rights) to take control of the infected computer (7)
  4. 7. 20. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry Defensive… (11)
  5. 9. 11. Security based on measurement and identification of unique physical characteristics of a person (17)
  6. 12. 16. Backup schedule whereby backups are made only of new files and files that have changed since the last backup. Resulting in greater backup efficiency (11)
  7. 13. 5. Morden computing makes it easy to ‘crack’ passwords. There is a simple way of scrambling data or text into a new format using a set of rules, name it (9)
  8. 16. 12. A software that is specifically designed to install itself without the users knowledge to negativity affect or ‘harm ’a computer system (7)
  9. 17. 2. Name a one Madware threat (5)
  10. 18. 15. Uninterruptible Power Supply (3)
  11. 20. 19. Creating a backup image of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure Disk… (7)
Down
  1. 1. 17. Checking for the correctness of data Data… (10)
  2. 4. 3. A form of malware that exploits weakness in an application or operating system in order to spread. (4)
  3. 5. 18. Checking for accuracy of data Data… (10)
  4. 8. 1. Name one category of threats to data (11)
  5. 10. 10. Hardware or software that monitors the traffic between a computer and the interne t, to safeguard against beaches in security (7)
  6. 11. 14. A form of malware disguised as a useful program, but in reality designed to do harm (6)
  7. 14. 9. This acts as a barrier between your computer and the internet (9)
  8. 15. 13. Redundant Array of Inexpensive/ Independent Disks (4)
  9. 19. 4. The quality of computer is often summarised by the ‘Garbage In, Garbage Out’. Fill in the acronym for this principle (4)