GCSE Computer Science Key words I-M
- Created by: DSD
- Created on: 29-12-17 22:07
L | H | Q | B | S | P | L | S | B | B | H | B | K | Y | V | J | K | Y | N | H | C |
P | U | B | W | O | W | W | V | X | E | N | D | F | R | K | N | P | J | T | R | L |
I | K | I | Y | Y | H | F | Q | D | E | I | B | Y | L | O | N | T | K | N | N | R |
F | J | X | C | Q | D | Q | R | X | G | M | H | L | W | P | B | B | G | F | K | L |
F | L | A | N | L | O | C | A | L | A | R | E | A | N | E | T | W | O | R | K | K |
X | A | E | M | I | L | M | L | Y | V | F | K | X | H | D | H | G | C | L | F | T |
O | L | Q | E | D | R | D | F | U | R | K | G | N | T | L | R | K | Y | T | S | B |
W | O | E | F | M | A | I | N | T | A | I | N | A | B | I | L | I | T | Y | F | H |
I | T | E | R | A | T | I | O | N | S | T | A | T | E | M | E | N | T | C | T | P |
S | D | U | G | V | L | S | P | P | W | K | S | K | M | H | R | U | X | Q | Q | M |
L | H | O | L | C | J | J | K | D | S | V | R | X | J | O | P | U | N | L | R | M |
L | A | W | F | U | L | I | N | T | E | R | C | E | P | T | I | O | N | X | S | P |
O | X | P | W | L | O | W | L | E | V | E | L | L | A | N | G | U | A | G | E | S |
Q | F | H | M | L | O | S | S | Y | C | O | M | P | R | E | S | S | I | O | N | N |
I | N | C | R | E | M | E | N | T | A | L | B | A | C | K | U | P | C | B | E | E |
V | M | Y | G | A | Q | F | P | E | G | P | Q | K | O | I | K | H | B | Y | H | A |
K | I | N | T | E | R | N | E | T | P | R | O | T | O | C | O | L | I | P | X | W |
X | O | G | C | P | M | A | G | N | E | T | I | C | S | T | O | R | A | G | E | E |
J | M | B | I | T | E | R | A | T | I | V | E | T | E | S | T | I | N | G | G | W |
C | H | J | D | T | W | K | J | E | Q | O | M | B | D | I | B | H | O | I | G | K |
N | E | S | I | H | G | X | K | N | J | X | H | F | J | R | R | N | M | R | R | L |
Clues
- A characteristic of defensive design that helps programmers modify and repair programs. (15)
- A network which only covers a single site. (3, 5, 4, 7)
- A programming language that is close to what a CPU would actually do and is written for specific hardware (i.e. CPU type). Eg. machine code and assembly languages. (3, 5, 8)
- A record of all the changes since the last incremental backup. (11, 6)
- A statement which makes the program repeat a set of instructions. (9, 9)
- Checking data on a network for cyber security purposes. (6, 12)
- Hard disk drives and magnetic tapes that hold data as magnetised patterns. (8, 7)
- Permanently removing data from the file to decrease the file size. (5, 11)
- Repeated testing done during the development of a program. (9, 7)
- The protocol responsible for packet switching. (8, 8, 2)
Comments
No comments have yet been made