The IT

1234567891011121314151617181920
Across
  1. 4. provides both verbal and non verbal communication
  2. 5. what type of visualisation diagram has nodes and sub nodes?
  3. 12. An electronic message that can be sent to multiple individuals
  4. 13. What is H.C.I?
  5. 14. What is used to check that the data has been entered matches the original data?
  6. 15. A type of malware that downloads onto a computer disguised as a legitimate program
  7. 18. A software designed to block access to a computer system until a sum of money is paid
  8. 19. What is a flow chart a type of?
  9. 20. this checks that data entered against a list of acceptable values
Down
  1. 1. A form of communication that provides content by combining text audio images and video
  2. 2. What type of hacker attacks a system with the purpose of harm?
  3. 3. A promotion technique using written and visual information
  4. 6. What does I.O.E stand for?
  5. 7. What is Data type check a type of?
  6. 8. What type of hacker has permission to attack the system?
  7. 9. A visual illustration which shows the order of something taking place
  8. 10. A malware which can replicate and spread itself from one computer to another
  9. 11. What does HCI connect together?
  10. 16. Generally a term for mostly free storage that can be remotely accessed through the internet
  11. 17. Generally a text-based format of communication.