U11 - Key terms from previous units
Across
- 4. A software or hardware device that monitors incoming and outgoing network traffic, applying rules to allow or disallow certain types of traffic.
- 7. A person who attempts to gain unauthorised access to a system.
- 9. (5,9) Using software and/or hardware resources that are operated by a third party remotely.
- 10. a permanent connection between a component of the IT system and uses dedicated wiring cabling often interchangeable with the term ethernet (802.3) when discussing network connections
- 11. (9,6,3) this is the most prevalent wired connection port in today's it landscape; it is a bidirectional bus which means it both transmit and receive on a single Port, each port can connect 127 individual devices acronym USB
- 12. a piece of code which, when certain conditions are met, will carry out an action which will be detrimental to the system, e.g. wiping data.
Down
- 1. (4,10,3) ensures that personal data is used responsibly. When designing, developing and/or using information systems, ethical considerations should be made with respect to how the information is collected, processed, stored, used and distributed
- 2. (8,9,10) detailed step-by-step guides to how functions should be carried out within an organisation to ensure that they are carried out accurately and in the same way each time.
- 3. a wireless (802.15) method often used to connect mice and keyboards as well as audio devices such as headphones and microphones, has a range of 100 meters. Named after a tenth-century King of Denmark and Norway.
- 5. (8,8)Locks and keypads for preventing access to computer rooms or storage facilities or to prevent access to storgare areas
- 6. misleading individuals or organisations into parting with their confidential and personal data to commit fraud.
- 8. An administrative division of a client/server network.