Computing A451
- Created by: Georgina
- Created on: 20-04-16 11:55
L | O | O | E | I | P | F | U | L | B | P | Q | S | V | U | I | Y | H | S | H | Q |
U | F | E | R | D | E | F | I | G | A | F | B | S | F | I | Q | E | I | Y | W | I |
C | F | U | A | F | R | M | U | G | U | L | K | I | G | Q | O | U | P | S | V | J |
E | T | T | W | M | I | H | H | L | T | H | S | B | N | S | E | D | U | T | R | C |
C | H | N | T | G | P | R | Q | J | O | C | P | R | O | E | P | Q | Y | E | M | P |
I | E | E | F | N | H | X | E | W | M | Y | Y | B | I | C | E | J | Y | M | O | X |
V | S | M | O | V | E | B | V | H | A | M | W | G | T | O | C | O | F | C | B | W |
E | H | E | S | Y | R | I | U | U | T | D | A | Q | A | N | Y | I | M | L | C | J |
D | E | G | E | Y | A | L | R | G | I | A | R | H | T | D | Q | E | E | E | K | M |
L | L | A | C | A | L | S | H | N | C | D | E | C | N | A | W | M | I | A | L | B |
A | F | N | R | Q | M | H | W | W | U | U | P | P | E | R | H | F | L | N | M | F |
R | S | A | U | I | A | S | G | Y | P | U | R | B | M | Y | B | W | W | U | F | L |
E | O | M | O | S | N | R | S | G | D | B | O | F | G | S | D | C | I | P | E | A |
H | F | Y | S | J | A | R | N | G | A | Y | T | S | A | T | J | T | X | T | J | G |
P | T | R | N | Y | G | E | R | J | T | B | E | S | R | O | I | X | M | O | P | K |
I | W | O | E | Y | E | E | Q | H | I | C | C | L | F | R | C | B | L | O | H | D |
R | A | M | P | A | M | E | A | V | N | T | T | V | E | A | S | R | D | L | O | D |
E | R | E | O | P | E | J | O | Q | G | D | I | K | D | G | Y | F | G | S | H | P |
P | E | M | C | F | N | U | A | I | L | Q | O | I | Y | E | F | C | L | C | G | R |
M | A | U | R | S | T | K | C | T | O | T | N | O | A | T | F | V | L | F | S | R |
L | P | Q | K | E | N | H | V | W | R | H | A | F | R | X | R | C | N | O | X | U |
Clues
- Kernel allows access to memory; prevents programs interfering (6, 10)
- Non-volatile memory (9, 7)
- OS ensures that the peripherals work correctly by using drivers on behalf of the programs (10, 10)
- Piece of hardware (10, 6)
- Ready-to-buy; aimed at a lot of users; relatively cheap; thoroughly tested; help available e.g. Microsoft Word (3, 3, 5, 8)
- Recognising related data so it is accessed quicker (15)
- Searches online, finds, downloads and installs software when a new update has been released (9, 8)
- Simply blocks the threat, or tries to eliminate it (7, 10)
- Source code avaliable for everyone; can be modified; usually free (4, 6, 8)
- Speeds up performance by deleting old files (6, 7, 5)
Comments
No comments have yet been made