Computer Management and safe-guarding our data

12345678910111213141516171819
Across
  1. 3. Name another word for ‘fishing for information’ (8)
  2. 7. Name one Madware threat (5)
  3. 8. Backup schedule whereby backups are made only of new files and files that have changed since the last backup. Resulting in greater backup efficiency (11)
  4. 9. This is a form of malware. It can cause relatively minor, annoying problems such as redirecting you to websites you don’t intend going to. (7)
  5. 11. Checking for the correctness of data Data… (10)
  6. 15. Security based on measurement and identification of unique physical characteristics of a person (17)
  7. 17. Uninterruptible Power Supply (3)
  8. 18. This acts as a barrier between your computer and the internet (9)
  9. 19. Creating a backup image of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure Disk… (7)
Down
  1. 1. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry Defensive… (11)
  2. 2. The quality of computer is often summarised by the ‘Garbage In, Garbage Out’. Fill in the acronym for this principle (4)
  3. 4. Name one category of threats to data (11)
  4. 5. Hardware or software that monitors the traffic between a computer and the interne t, to safeguard against beaches in security (7)
  5. 6. A form of malware disguised as a useful program, but in reality designed to do harm (6)
  6. 7. Checking for accuracy of data Data… (10)
  7. 10. A software that is specifically designed to install itself without the users knowledge to negativity affect or ‘harm ’a computer system (7)
  8. 12. Redundant Array of Inexpensive/ Independent Disks (4)
  9. 13. Morden computing makes it easy to ‘crack’ passwords. There is a simple way of scrambling data or text into a new format using a set of rules, name it (9)
  10. 14. A form of malware that exploits weakness in an application or operating system in order to spread. (4)
  11. 16. A collection of programs that are designed to infiltrate a computer and gain the highest levels of privileges(administrator rights) to take control of the infected computer (7)