Computer management - safe-guardung our data

12345678910111213141516171819
Across
  1. 2. 9. An error is also known as a …
  2. 5. security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
  3. 7. Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
  4. 8. issues 2. A category of threats to data beginning with H
  5. 10. Power Supply 10. What does “UPS” stand for ?
  6. 11. 6. The first line of defence is
  7. 12. Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
  8. 15. 5. What is the term for ‘fishing for Information’
  9. 16. 1. A water related natural disaster
  10. 18. 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
  11. 19. 7. Volatile memory
Down
  1. 1. 3. A form of malware disguised as a useful program
  2. 3. 5. ‘Garbage In, Garbage Out’
  3. 4. User Interface 2. What does GUI stand for?
  4. 6. 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
  5. 7. Array of Inexpensive 1. What does RAID stand for ?
  6. 9. 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
  7. 13. worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
  8. 14. problems 8. Power outages or power dips are also known as…
  9. 17. verification 8. Checking for the accuracy of data from a human perspective