IT Theory

12345678910111213
Across
  1. 1. On-demand availability of delocalized computer system resources
  2. 4. systems use light instead of electricity to transmit information
  3. 6. Process of converting readable data into unreadable characters to prevent unauthorized access.
  4. 8. An Internet service that provides remote storage to computer users.
  5. 10. Designing a database by splitting the data into related tables to reduce data redundancies.
  6. 12. A field that uniquely identifies a given entity in a table
  7. 13. the degree to which data is accurate, precise and trusted
Down
  1. 2. A condition in which an attribute is dependent on another attribute that is not part of the primary key.
  2. 3. the process of analyzing data to extract information not offered by the raw data alone
  3. 5. Where all data is kept irrespective of the source and its structure
  4. 7. A primary key that consists of more than one attribute.
  5. 9. A large collection of data from many different sources
  6. 11. A protocol for sending packets that does error-checking to ensure all packets are received and properly ordered