Informatics 1Term

123456789101112131415161718192021
Across
  1. 1. Government, Business, Education.
  2. 4. It is the result of the integration of four elements: hardware, software, data and users.
  3. 6. Email, search engines, Bank on line, e-comerce.
  4. 7. Continued access to the elements of information stored and processed in a computer system.
  5. 8. Tools to create programs.
  6. 9. Software to prevent and detect unwanted system intruders.
  7. 10. A computer virus is a program (code) that replicates by adding a copy of itself to other (s) program (s).
  8. 13. Validity and consistency of the items of information stored and processed in a computer system.
  9. 15. Set of programs that take full control of both the hardware and the software.
  10. 17. Privacy of the information items stored and processed in a computer system.
  11. 20. Informatics studies the representation, processing, and communication of information in natural and engineered systems.
  12. 21. It serves to prevent, detect and correct virus attacks on the system.
Down
  1. 2. Programs to interact with the system.
  2. 3. Includes all technical means that are used for handling information and facilitating communication, including computers, network hardware, communication lines and all the necessary software.
  3. 5. Programs to make easiest your task in the computer.
  4. 6. Is the result of processing and transformation of data.
  5. 11. Symbols representing events, situations, conditions or values. Data are the raw material processed to produce information.
  6. 12. Machine able to process information.
  7. 14. Hidden in the underlying code of web pages. When the user accesses these websites, the virus is downloaded and run on your system and can modify or destroy the information stored.
  8. 16. Is an environment in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
  9. 18. communities People connected each other though internet tool.
  10. 19. People with advanced technical skills in the computer area and focusing their skills to the invasion of systems that do not have authorized access.