Across
- 3. Uses magnetic patterns to store data.
- 6. External Network
- 9. The method of recycling used computers. and improving carbon footprint.
- 10. Form of internet access that uses the facilities of a telephone network.
- 11. Internal Network
- 13. Information storage that can be easily damaged and costs a lot to transport.
- 14. Processed data
- 16. Information regarding a specific business.
- 19. wseeeeeeeecftgvbhjniuyftvgbhj (difficult to understand)
- 21. Non-subjective data. Facts and figures.
- 22. CDs and DVDs
- 23. Information which is extremely personal.
- 26. Information that is protected against unwanted disclosure.
- 27. Numbers
- 28. Subjective data. Opinions.
- 29. Information which is widely available to all.
- 31. Scrambles words and documents to prevent unauthorised disclosure.
- 33. The language used to write webites.
- 34. Device that cannot be moved while active
- 38. Different levels of permission
- 40. Can the information be trusted?
- 41. Data sourced by yourself
- 42. Stores data and information in circuitry
Down
- 1. Something outside a business.
- 2. Access levels, passwords
- 4. Information to which access is restricted by law or regulation to particular people.
- 5. Locks, security guards, cable ties.
- 7. Information that is not protected against unwanted disclosure.
- 8. WWW
- 12. IS the information up to date?
- 15. Data can be written over.
- 17. Information which regards personal details eg. medical, bank.
- 18. Information regarding a specific person.
- 20. unprocessed Information
- 24. Information type with 2 answers
- 25. Device that can be moved while active
- 30. Money efficient
- 32. How easily it can be damaged.
- 35. 7 step guide for analysing data.
- 36. Data collected by others.
- 37. Wide bandwidth data transmission which transports multiple signals are traffic types.
- 39. Monitors data entering a network.
