Computer management

12345678910111213141516171819
Across
  1. 2. Malware that is able to distribute itself over a network normally via email
  2. 5. Fooling a user into giving out confidential data also referred to as ‘Fishing for information’
  3. 7. Creates a backup image of entire hard drive.
  4. 10. Collection of programs designed to use administrator rights to gain control of a computer
  5. 11. backup Backing up of data on a server on the internet with advantages of data synchronising .
  6. 13. any attempt to manipulate or 'con' soemone into installing malware. This is known as Social________.
  7. 17. Form of malware that monitors and tracks the way you use your computer to gain confidential information
  8. 18. Checking the accuracy of data from human perspective known as Data _________.
  9. 19. Security Security based on measurement and dentification of unique physical characteristics
Down
  1. 1. Technique of used to make electronic communication seem to come from another person.
  2. 3. Checking the correctness of data from perspective of computer known as Data _________.
  3. 4. device that puts a battery and a management system between the computer and the main power supply
  4. 6. The quality of computer output is often summarised by this principle
  5. 8. Backup schedule whereby backups are made only of new files and files that have changed since last backup resulting in back up effiency . This is known as ______ backup.
  6. 9. Program disguised as useful or desirable features
  7. 12. Technique programmer makes pro active provison for possible errors made by the user this can be reffered to as _________ Programming.
  8. 14. designed to minimise the possibility of data loss
  9. 15. Barrier between the computer and the internet
  10. 16. Simple way of scrambling text or data into a new format using specified rules
  11. 18. Form of malware that attaches itself to a file