IT Theory

12345678910111213
Across
  1. 3. A large collection of data from many different sources
  2. 6. Designing a database by splitting the data into related tables to reduce data redundancies.
  3. 8. Process of converting readable data into unreadable characters to prevent unauthorized access
  4. 11. A primary key that consists of more than one attribute.
  5. 12. An Internet service that provides remote storage to computer users.
  6. 13. A field that uniquely identifies a given entity in a table
Down
  1. 1. On-demand availability of delocalized computer system resources
  2. 2. systems use light instead of electricity to transmit information
  3. 4. A condition in which an attribute is dependent on another attribute that is not part of the primary key.
  4. 5. the process of analyzing data to extract information not offered by the raw data alone
  5. 7. A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered
  6. 9. the degree to which data is accurate, precise and trusted
  7. 10. Where all data is kept irrespective of the source and its structure