OS & Utility Software

1234567
Across
  1. 2. can be used to filter between trusted and untrusted networks and prevent programs from communicating through the use of ports.
  2. 5. involves rearranging the information on a disk so that files appear in continuous sequences of clusters. This will improve file access times.
  3. 7. The storage drive is divided into a number of clusters. The table of contents serves as an address book, keeping a record of each file and the clusters used to store that file.
Down
  1. 1. This allows the user to restore the system to a previous state which is saved as a ______.
  2. 2. The OS usually ¬_______ storage media when it is connected to the computer.
  3. 3. the process of converting information or data into a code, especially to prevent unauthorized access.
  4. 4. allow the user to allocate specific users and protects personal files and programs from unauthorised access.
  5. 6. The software which is used to detect and remove the malwares from our computer system.