Across
- 5. Hard Drives, tapes
- 6. Language used to write websites
- 8. The process of checking whether the specification captures the needs of the task
- 11. Data should be processed fairly and lawfully
- 12. Monitors the traffic coming in and out of the system
- 18. Sources of data that is input into a system from outside of the current system (DFD)
- 20. Processed figures and data
- 22. This act covers the power of public bodies to carry out investigations and surveillance
- 24. Using computing resources in ways that help reduce energy and operating costs
- 25. Private, part shared access
- 28. CD, DVD, Blue Ray
Down
- 1. Means of sending or receiving information, such as telephone lines or computers
- 2. This act provides the public with the 'right to access' information about the activities carried out by public authorities
- 3. Private, closed access
- 4. Locks, keypads, biometrics
- 7. The process of checking if what was entered meets the specification
- 9. Represent any real world store of data held in a system (DFD)
- 10. Tiered levels of access, firewalls, anti malware
- 13. Small tablet, smartphone, ebook
- 14. Act covers hacking and authorised access to computer material
- 15. Flows between the entities and process (DFD)
- 16. Public, open access (www)
- 17. Bumps and pips to help the visually challenged
- 19. These are the ways that data is collected (DFD)
- 21. Convert information or data into a code to prevent unauthorised access
- 23. Audio streaming
- 26. SSD hard drives, memory cards
- 27. Raw facts and figures
