OS & Utility Software
Across
- 2. can be used to filter between trusted and untrusted networks and prevent programs from communicating through the use of ports.
- 5. involves rearranging the information on a disk so that files appear in continuous sequences of clusters. This will improve file access times.
- 7. The storage drive is divided into a number of clusters. The table of contents serves as an address book, keeping a record of each file and the clusters used to store that file.
Down
- 1. This allows the user to restore the system to a previous state which is saved as a ______.
- 2. The OS usually ¬_______ storage media when it is connected to the computer.
- 3. the process of converting information or data into a code, especially to prevent unauthorized access.
- 4. allow the user to allocate specific users and protects personal files and programs from unauthorised access.
- 6. The software which is used to detect and remove the malwares from our computer system.