GCSE Computer Science Key words N-P
- Created by: DSD
- Created on: 29-12-17 22:37
H | S | S | O | E | C | P | A | T | W | O | X | H | A | P | S | S | W | E | X | F |
K | K | I | P | W | Y | A | A | C | Y | O | P | L | Y | C | V | K | N | N | X | M |
O | E | N | E | Y | N | C | M | P | R | X | R | S | V | Y | H | R | E | S | R | O |
N | D | E | N | Q | J | K | H | R | O | Y | O | A | A | M | G | O | T | F | O | M |
E | B | T | S | O | C | E | I | E | M | V | P | H | A | N | X | W | W | H | G | V |
S | L | W | O | P | E | T | V | T | E | Y | R | B | O | V | T | T | O | V | K | K |
T | U | O | U | E | J | S | N | N | M | Y | I | A | X | D | O | E | R | M | G | H |
E | H | R | R | R | I | W | S | U | E | E | E | N | C | H | G | N | K | A | I | S |
D | N | K | C | A | C | I | C | O | L | R | T | I | K | J | F | S | S | D | R | G |
I | Y | F | E | T | N | T | U | C | I | R | A | G | I | P | D | L | E | G | I | S |
F | I | O | S | I | G | C | U | M | T | F | R | D | T | U | U | O | C | L | N | T |
S | X | R | O | N | J | H | R | A | A | F | Y | G | M | S | H | C | U | G | S | W |
T | V | E | F | G | T | I | B | R | L | C | S | U | X | O | T | O | R | U | I | C |
A | Y | N | T | S | J | N | J | G | O | T | O | I | T | Y | R | T | I | A | D | Q |
T | T | S | W | Y | F | G | Y | O | V | E | F | V | U | W | I | O | T | B | J | H |
E | Y | I | A | S | N | R | T | R | N | R | T | T | Q | D | Y | R | Y | M | X | U |
M | B | C | R | T | J | A | K | P | O | G | W | I | A | M | W | P | O | U | J | P |
E | G | S | E | E | H | V | X | M | N | J | A | L | L | I | L | V | D | O | M | T |
N | A | A | G | M | E | T | P | K | S | P | R | L | T | Q | B | X | Y | Q | P | E |
T | R | M | D | R | W | G | J | Q | U | X | E | H | I | H | U | V | I | Q | G | S |
F | N | I | O | D | R | B | R | A | C | O | I | K | K | G | E | M | X | O | P | Y |
Clues
- A piece of software responsible for running the computer, managing hardware, applications, users and resources. (9, 6)
- A selection statement made up of multiple lF statements inside each other. (6, 2, 9)
- A set of rules for how devices communicate over a network. (9, 8)
- Holds the memory address of the next CPU instruction. (7, 7, 2)
- Investigations that organisations undertake to find the cause of attacks on their network (7, 9)
- Memory that retains its contents when it has no power. (3, 8, 6)
- Protection against network attacks. (7, 8)
- Software that can be modified and shared by anyone. (4, 6, 8)
- Software where modifying and sharing is not permitted. (11, 8)
- The process of directing data packets on a network using routers and the IP protocol. (6, 9)
Comments
No comments have yet been made