CSIT Words

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152
Across
  1. 4. The last configuration that ran well.
  2. 6. Allows you to boot certain things up safely with networking.
  3. 7. Authentication that requires multiple steps
  4. 11. Protects you from downloading things that are harmful to your computer.
  5. 12. Allows you to wipe data from a computer without physical access.
  6. 14. Nonbinding agreement that highlights the agreements of two or more parties to collaborate or conduct business. It serves as a starting point for negotiations, defining key objectives, roles, and responsibilities of each party involved
  7. 15. A microsoft application that allows you to access other approved applications.
  8. 17. A type of malware that holds your computer in lockdown until you pay a ceratin amount
  9. 19. The policy of how long you are able to hold data.
  10. 21. Storage that stores things online and easily accessible.
  11. 22. A new table for allocating file destinations.
  12. 23. A security measure that uses a pin to lock securely
  13. 26. The command panel.
  14. 31. An account that only allows you to log into one computer.
  15. 33. Security Updates, typically small.
  16. 35. Phishing but with voice.
  17. 37. A software that gives authorization to a user to centralized resources
  18. 39. The use that is accepted by a policy.
  19. 40. A connector that supports visual and audio.
  20. 43. A port that only supports a display cable.
  21. 45. A type of software that counters malware
  22. 46. Backup that backups data in pieces.
  23. 49. A device that automatically assigns an IP to something, abbreviated.
  24. 50. Used to connect a visual output to a graphics card
  25. 51. A type of software that makes something work inside of a device.
  26. 52. Backup that only backups the data since last change.
Down
  1. 1. The first GUI that shows up when you turn the computer on, it is how you can log into other accounts and put in a password for one account.
  2. 2. USB-C, or USB Type-C, is a 24-pin reversible connector that supersedes previous USB connectors and can carry audio, video, and other data to connect various devices such as monitors, external drives, and mobile phones. It is an industry-standard connector for transmitting both data and power on a single cable, supporting faster charging and data transfer rates compared to older USB types.
  3. 3. Device management on mobile devices.
  4. 5. Something someone does to act friendly to try and get access into your computer to do harmful things to it.
  5. 8. Something that allows you to experiment without harming a physical computer.
  6. 9. A type of malware that logs your keystrokes.
  7. 10. A log that logs the amount of
  8. 11. The word for sharing files to other people.
  9. 13. A panel that allows you to view the panel that controls permissions of certain user accounts.
  10. 15. A backup that mirrors the data since last time.
  11. 16. An abbreviation that stands to bring your own device.
  12. 18. A type of safe mode that allows you to access safe mode with command prompt access within windows.
  13. 20. This is where you see all the open and pinned applications that are currently on your computer.
  14. 24. Cloud based mobile service.
  15. 25. Group security settings.
  16. 27. A harmful software, typically confused with a virus.
  17. 28. A type of harmful software, often confused with malware.
  18. 29. A type of software that counters a virus
  19. 30. A physical attack to a hardware component
  20. 32. A panel that allows you to control multiple things on your computer.
  21. 34. A type of install that allows your windows to run the way you wish to set it up.
  22. 36. Metrics that have measures of biology.
  23. 38. A microsoft supported account that allows you to sign into other microsoft computers.
  24. 41. Allows you to boot certain things up safely.
  25. 42. A physical card that authorizes someone to a place
  26. 44. the process of restoring a database or program to a previously defined state, typically to recover from an error.
  27. 47. USB Type A, also known as Standard-A, is a flat and rectangular connector that is the most recognizable and commonly used USB connector. It is supported in every USB version, including USB 3.0, USB 2.0, and USB 1.1. USB Type A connectors are typically found on computers, laptops, game consoles
  28. 48. A type of virus/malware that disguises itself as a desirable application that you would want.