Across
- 5. - hardware used to capture the biometric for verification of identity.
- 7. - A type of security to prevent unauthorized access to data.
- 10. - the memory in the computer system which is used for running software.
- 11. - a way of identifying or confirming an individual’s identity using their face.(2 words)
- 14. - A string of characters used for authentication on a digital device
Down
- 1. – one or more Central Processing Units that carry out software instructions
- 2. - A computer security system
- 3. - a device’s ability to connect to networks and other devices.
- 4. - capture an individual’s fingerprint images and translate the images into a digital code.(2 words)
- 6. - this interface is controlled by the user by swiping their fingers on the screen or across the screen.
- 8. - used to make a device inactive so that it requires a password or PIN to reactive it
- 9. - this interface is controlled by the user giving spoken commands to the device.
- 12. – a user interface controlled by entering text instructions
- 13. - a user interface controlled by a pointer on the screen