Across
- 2. hat hacker a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
- 3. A series, or log, of discussion items on a page of the World Wide Web
- 4. Items such as images or videos to be include din the final product
- 6. rights The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system
- 7. Automatic Number Plate Recognition
- 8. use this to create spreadsheets
Down
- 1. preference or point of view that is personal, rather than scientific.
- 2. Measurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
- 3. A partiMeasurements of individual body characteristics, such as a retina scan or fingerprint; sometimes used in computer security.
- 5. A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.
- 6. computer software that displays advertisements
