GCSE Computer Science Key words N-P
- Created by: DSD
- Created on: 29-12-17 22:37
K | A | U | G | P | J | T | M | P | C | J | J | O | R | X | U | D | R | N | C | F |
H | T | S | N | R | S | N | F | A | W | P | N | M | C | W | Y | G | B | B | G | G |
M | J | M | S | O | N | K | P | C | Y | R | O | T | I | H | J | T | I | Q | S | X |
P | Q | E | C | T | P | N | S | K | R | O | P | N | A | E | H | F | I | C | P | Q |
J | U | T | I | O | S | E | H | E | O | P | E | N | R | I | N | F | A | P | U | U |
J | L | S | S | C | O | S | X | T | M | R | N | V | B | X | E | Q | V | R | Q | J |
P | Y | Y | N | O | D | T | J | S | E | I | S | N | I | Q | T | K | V | E | N | K |
O | T | S | E | L | V | E | J | W | M | E | O | P | I | E | W | O | U | T | H | M |
O | F | G | R | S | E | D | O | I | E | T | U | L | L | U | O | A | M | N | C | G |
R | E | N | O | N | R | I | F | T | L | A | R | N | N | U | R | L | O | U | A | H |
O | K | I | F | E | K | F | C | C | I | R | C | E | L | N | K | E | I | O | B | R |
D | N | T | K | T | N | S | J | H | T | Y | E | L | L | C | S | H | E | C | A | B |
U | W | A | R | W | S | T | S | I | A | S | S | K | Q | O | E | D | L | M | D | Q |
B | M | R | O | O | V | A | R | N | L | O | O | S | M | M | C | V | B | A | X | R |
J | C | E | W | R | A | T | W | G | O | F | F | H | U | K | U | J | E | R | X | G |
B | W | P | T | K | I | E | R | V | V | T | T | A | R | X | R | S | E | G | B | B |
D | S | O | E | S | H | M | Y | C | N | W | W | M | P | V | I | F | W | O | H | U |
G | U | U | N | H | E | E | N | O | O | A | A | M | R | H | T | R | Q | R | H | V |
N | M | P | H | D | B | N | C | L | N | R | R | M | N | L | Y | S | I | P | C | C |
G | I | I | O | Q | T | T | J | K | T | E | E | K | M | W | J | E | B | X | W | K |
O | Q | B | N | U | A | X | T | E | K | P | U | S | S | W | A | R | Y | L | M | V |
Clues
- A piece of software responsible for running the computer, managing hardware, applications, users and resources. (9, 6)
- A selection statement made up of multiple lF statements inside each other. (6, 2, 9)
- A set of rules for how devices communicate over a network. (9, 8)
- Holds the memory address of the next CPU instruction. (7, 7, 2)
- Investigations that organisations undertake to find the cause of attacks on their network (7, 9)
- Memory that retains its contents when it has no power. (3, 8, 6)
- Protection against network attacks. (7, 8)
- Software that can be modified and shared by anyone. (4, 6, 8)
- Software where modifying and sharing is not permitted. (11, 8)
- The process of directing data packets on a network using routers and the IP protocol. (6, 9)
Comments
No comments have yet been made