Computer management - safe-guardung our data

12345678910111213141516171819
Across
  1. 4. 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
  2. 5. 9. An error is also known as a …
  3. 6. Array of Inexpensive 1. What does RAID stand for ?
  4. 10. 1. A water related natural disaster
  5. 11. worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
  6. 12. verification 8. Checking for the accuracy of data from a human perspective
  7. 15. security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
  8. 16. Power Supply 10. What does “UPS” stand for ?
  9. 17. 5. What is the term for ‘fishing for Information’
  10. 19. 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
Down
  1. 1. 5. ‘Garbage In, Garbage Out’
  2. 2. Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
  3. 3. 7. Volatile memory
  4. 5. 6. The first line of defence is
  5. 7. 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
  6. 8. 3. A form of malware disguised as a useful program
  7. 9. Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
  8. 13. problems 8. Power outages or power dips are also known as…
  9. 14. User Interface 2. What does GUI stand for?
  10. 18. issues 2. A category of threats to data beginning with H