Across
- 3. ORDERED LIST
- 5. ENSURES DATA IS ACCURATE. E.G. PRESENCE, FORMAT AND RANGE
- 6. MADE SO THAT LOST DATA CAN BE RECOVERED EASILY
- 9. ASSIGNED TO EACH USER TO ENSURE THEY ONLY ACCESS PARTICULAR FILES
- 12. ATTACHED TO A DOCUMENT OR SPREADSHEET, COPYING ITSELF FROM ONE APPLICATION TO ANOTHER BY INFECTING START UP FILE
- 13. WORLDWIDE COMMUNICATION SYSTEM LINKING COMPUTERS IN GEOGRAPHICALLY SEPERATE AREAS
- 14. PROGRAM THAT IS SELF REPLICATING AND CAN INFECT A COMPUTER
- 15. A USER INTERFACE OF THE APPLICATION WHERE APPS ARE DISPLAYED IN BROWSER
- 16. THE START OF ANY WEB PAGE
Down
- 1. LIES DORMANT UNTIL A SPECIFIC PIECE OF PROGRAM CODE IS ACTIVATED
- 2. WHEN A WEBSITE CONTAINS ELEMENTS THAT ALLOW THE USER TO INTERACT
- 4. MALICIOUS PROGRAMS THAT REPLICATE THEMSELVES FROM SYSTEM TO SYSTEM
- 7. PROCESSED ON THE WEB SERVER WHEN THE USER REQUESTS INFORMATION
- 8. A SECRET SERIES OF CHARACTERS USED TO GAIN ACCESS TO A COMPUTER SYSTEM
- 10. WHEN A WEBSITE HAS NO FORM OF INTERACTIVITY
- 11. PRIVATE COMMUNICATION SYSTEM WITHIN AN ORGANISATION
