ICT Cross Word

12345678
Across
  1. 2. hat hacker a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
  2. 3. A series, or log, of discussion items on a page of the World Wide Web
  3. 4. Items such as images or videos to be include din the final product
  4. 6. rights The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system
  5. 7. Automatic Number Plate Recognition
  6. 8. use this to create spreadsheets
Down
  1. 1. preference or point of view that is personal, rather than scientific.
  2. 2. Measurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
  3. 3. A partiMeasurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
  4. 5. A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.
  5. 6. computer software that displays advertisements