Unit 2 Global Information

12345678910111213141516171819202122232425262728
Across
  1. 5. Hard Drives, tapes
  2. 6. Language used to write websites
  3. 8. The process of checking whether the specification captures the needs of the task
  4. 11. Data should be processed fairly and lawfully
  5. 12. Monitors the traffic coming in and out of the system
  6. 18. Sources of data that is input into a system from outside of the current system (DFD)
  7. 20. Processed figures and data
  8. 22. This act covers the power of public bodies to carry out investigations and surveillance
  9. 24. Using computing resources in ways that help reduce energy and operating costs
  10. 25. Private, part shared access
  11. 28. CD, DVD, Blue Ray
Down
  1. 1. Means of sending or receiving information, such as telephone lines or computers
  2. 2. This act provides the public with the 'right to access' information about the activities carried out by public authorities
  3. 3. Private, closed access
  4. 4. Locks, keypads, biometrics
  5. 7. The process of checking if what was entered meets the specification
  6. 9. Represent any real world store of data held in a system (DFD)
  7. 10. Tiered levels of access, firewalls, anti malware
  8. 13. Small tablet, smartphone, ebook
  9. 14. Act covers hacking and authorised access to computer material
  10. 15. Flows between the entities and process (DFD)
  11. 16. Public, open access (www)
  12. 17. Bumps and pips to help the visually challenged
  13. 19. These are the ways that data is collected (DFD)
  14. 21. Convert information or data into a code to prevent unauthorised access
  15. 23. Audio streaming
  16. 26. SSD hard drives, memory cards
  17. 27. Raw facts and figures