CROSSWORD INTEGRATION on ICT

123456789101112131415161718
Across
  1. 3. This is a deceptive method used to steal sensitive information by pretending to be a trustworthy source
  2. 5. It refers to the physical components of a computerthat you can touch and see
  3. 7. These devices display or output data from a computer
  4. 8. This software helps manage a company's interactions with current and potential customers
  5. 10. This is harmful software designed to damage or disrupt systems
  6. 11. It involves organizing and maintaining data processes efficiently
  7. 12. This type of software helps users perform specific tasks like writing or calculating
  8. 15. This is a set of instructions that tells a computer how to perform tasks
  9. 17. It involves protecting computers and networks from unauthorized access or attacks
  10. 18. It integrates core business processes into a single system
Down
  1. 1. This allows users to store and access data over the internet instead of local hardware
  2. 2. These devices allow users to enter data into a computer
  3. 4. It manages the hardware and software resources of a computer system
  4. 6. This is a security system that controls the incoming and outgoing network traffic
  5. 9. It refers to the unauthorized access or manipulation of computer systems
  6. 13. It secures access to systems or information using a secret combination of characters
  7. 14. This includes all technologies used to handle telecommunications, broadcasting, and information systems
  8. 16. It involves encoding information so that only authorized parties can understand it