Computer Management and safe-guarding our data

1234567891011121314151617181920
Across
  1. 4. 3. A form of malware that exploits weakness in an application or operating system in order to spread. (4)
  2. 6. 19. Creating a backup image of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure Disk… (7)
  3. 7. 20. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry Defensive… (11)
  4. 11. 16. Backup schedule whereby backups are made only of new files and files that have changed since the last backup. Resulting in greater backup efficiency (11)
  5. 13. 18. Checking for accuracy of data Data… (10)
  6. 15. 5. Morden computing makes it easy to ‘crack’ passwords. There is a simple way of scrambling data or text into a new format using a set of rules, name it (9)
  7. 17. 13. Redundant Array of Inexpensive/ Independent Disks (4)
  8. 18. 2. Name a one Madware threat (5)
  9. 20. 7. A collection of programs that are designed to infiltrate a computer and gain the highest levels of privileges(administrator rights) to take control of the infected computer (7)
Down
  1. 1. 17. Checking for the correctness of data Data… (10)
  2. 2. 14. A form of malware disguised as a useful program, but in reality designed to do harm (6)
  3. 3. 6. This is a form of malware. It can cause relatively minor, annoying problems such as redirecting you to websites you don’t intend going to. (7)
  4. 5. 11. Security based on measurement and identification of unique physical characteristics of a person (17)
  5. 8. 8. Name another word for ‘fishing for information’ (8)
  6. 9. 1. Name one category of threats to data (11)
  7. 10. 12. A software that is specifically designed to install itself without the users knowledge to negativity affect or ‘harm ’a computer system (7)
  8. 12. 10. Hardware or software that monitors the traffic between a computer and the interne t, to safeguard against beaches in security (7)
  9. 14. 9. This acts as a barrier between your computer and the internet (9)
  10. 16. 4. The quality of computer is often summarised by the ‘Garbage In, Garbage Out’. Fill in the acronym for this principle (4)
  11. 19. 15. Uninterruptible Power Supply (3)