The IT
Across
- 4. provides both verbal and non verbal communication
- 5. what type of visualisation diagram has nodes and sub nodes?
- 12. An electronic message that can be sent to multiple individuals
- 13. What is H.C.I?
- 14. What is used to check that the data has been entered matches the original data?
- 15. A type of malware that downloads onto a computer disguised as a legitimate program
- 18. A software designed to block access to a computer system until a sum of money is paid
- 19. What is a flow chart a type of?
- 20. this checks that data entered against a list of acceptable values
Down
- 1. A form of communication that provides content by combining text audio images and video
- 2. What type of hacker attacks a system with the purpose of harm?
- 3. A promotion technique using written and visual information
- 6. What does I.O.E stand for?
- 7. What is Data type check a type of?
- 8. What type of hacker has permission to attack the system?
- 9. A visual illustration which shows the order of something taking place
- 10. A malware which can replicate and spread itself from one computer to another
- 11. What does HCI connect together?
- 16. Generally a term for mostly free storage that can be remotely accessed through the internet
- 17. Generally a text-based format of communication.