Across
- 3. This piece of the equipment, when used properly with your computer, will prevent your computer from power failure or power surges/spikes.
- 6. Second copies of our files are called this and stored on a a separate hard drive (in addition to the computer) to prevetnt against data corruption.
- 8. This is a natural disaster that we have had at school during storms, leading to damage of our computer
- 9. To prevent against Trojans only open files or run programmes from t_ _ _ _ _ _ sources.
- 11. Trojans are often hidden in a_ _ _ _ _ _ _ _ _ s to emails.
- 13. Unlike a virus or worm, Malware/Spyware cannot self-r _ _ _ _ _ _ _ _.
- 14. Name of a document that contains the rules and expected student behaviour when using IT within a school.
- 18. Failure to this part of the computer is usually mechanical such as fan failure leading to overheating and possible disastours consequences for your computer data.
- 19. Software that spies on your computer activities and preferences.
- 20. A common type of high risk data threat that usually comes via email and involves an attempt to get you to give out personal information through a fake website link.
- 21. Name of a person who gains unauthorised access to a computer system to steal/destroy files.
- 23. Software intended to damage or disable computer systems
Down
- 1. A piece of computer code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 2. Name of a person who gains unauthorised access to a computer system for fun.
- 4. This is a type of 'bad' or malicious code that can exist on websites that is set-up to harm computer data or can even infect computers with viruses.
- 5. Named after a Greek myth about a horse gifted to a town which had soldiers hidden inside; similarly this is a piece of software that appears to do one thing but actually does another, often hiding a virus or keystroke loggers to copy your passwords.
- 7. A machine used to destroy printed copies of electronic documents for security purposes.
- 10. The largest group of computer criminals who have easy access to computers and their data.
- 12. This type of network is more difficult to control as permissions for machine access are set on each individual machine.
- 15. A n_ _ _ _ _ _ connection is when two or more computers are connected to allow sharing of files or devices, even internet connectivity.
- 16. The access to machines on a s_ _ _ _ _-based network is controlled from one location, making it more secure to set-up than some other networks.
- 17. Closing windows and locking doors to computer rooms is a p_ _ _ _ _ _ _ way to restrict access to computer systems to protect data.
- 22. The name of a small file attached to websites that store information in your web browser about your browsing activity on the site and any information you entered into forms.
