Computer management - safe-guardung our data
Across
- 2. 9. An error is also known as a …
- 5. security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
- 7. Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
- 8. issues 2. A category of threats to data beginning with H
- 10. Power Supply 10. What does “UPS” stand for ?
- 11. 6. The first line of defence is
- 12. Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
- 15. 5. What is the term for ‘fishing for Information’
- 16. 1. A water related natural disaster
- 18. 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
- 19. 7. Volatile memory
Down
- 1. 3. A form of malware disguised as a useful program
- 3. 5. ‘Garbage In, Garbage Out’
- 4. User Interface 2. What does GUI stand for?
- 6. 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
- 7. Array of Inexpensive 1. What does RAID stand for ?
- 9. 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
- 13. worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
- 14. problems 8. Power outages or power dips are also known as…
- 17. verification 8. Checking for the accuracy of data from a human perspective