COMPUTER OPERATIONS

123456789101112131415161718
Across
  1. 4. a room adjacent to the computer center that provides safe storage for the off-line data files
  2. 5. a comprehensive statement of all actions to be taken before, during and after any type of disaster, along with documented, tested procedures that will ensure the continuity of operations
  3. 8. used interchangeably with virus
  4. 11. those for whom the system is built
  5. 12. a secret code entered by the user to gain access to systems, applications, data files or a network server
  6. 13. the electronic files produced are later processed by the central computer, which is managed by
  7. 15. involves trickery that makes a message appear as if it came from an authorized individual or firm when it did not
  8. 16. a program whose purpose is to capture IDs and passwords from unsuspecting users
  9. 17. function transcribes transaction data from paper source documents into computer input
  10. 18. individuals inside or outside the firm who have an interest in the system, but are not end users
Down
  1. 1. the operating system's first line of defense against unauthorized access
  2. 2. a software program that allows unauthorized access to a system without going through the normal logon procedure
  3. 3. includes systems analysts, database designers and programmers who design and build the system
  4. 5. an alternative to the centralized model is the concept of
  5. 6. defined generally as any unsolicited e-mail
  6. 7. the computer's control program
  7. 9. the ability of the system to continue operation when part of the system fails due to hardware failure, applications program error or operator error
  8. 10. a program that attaches itself to a legitimate program to penetrate the operating system
  9. 14. a destructive program, such as virus, that is triggered by some predetermined event
  10. 17. manages the computer resources used to perform day-to-day processing of transactions