ICT
- Created by: MooginS
- Created on: 01-04-16 13:43
O | H | D | H | W | F | D | N | J | H | E | H | B | O | H | P | S | P | E | F | K |
W | R | X | C | A | P | X | N | L | J | N | I | S | X | Q | O | U | Y | G | N | F |
D | W | C | A | G | Q | I | E | U | W | O | G | T | P | F | K | Q | V | V | M | B |
O | K | H | Y | C | E | R | C | A | M | P | G | F | T | C | U | C | T | N | D | C |
G | M | O | N | X | L | B | J | E | A | O | L | W | A | J | M | H | T | F | B | Q |
G | C | P | F | I | I | M | T | J | L | O | A | B | C | B | S | K | I | T | S | M |
J | J | X | T | N | P | R | V | T | I | R | L | D | P | W | I | L | U | N | R | S |
A | B | P | Q | O | I | G | I | E | E | A | I | Y | Q | E | S | C | C | Q | X | G |
F | N | F | C | C | I | D | I | P | T | S | R | R | I | Q | P | N | R | L | G | N |
N | V | X | S | L | U | M | A | N | T | G | W | T | E | A | U | W | I | S | G | O |
J | T | O | U | A | K | T | E | R | N | P | G | N | J | Y | Y | Q | C | L | B | P |
U | C | N | L | E | C | M | I | I | C | W | X | E | S | P | A | D | D | L | Q | A |
D | A | J | V | H | E | B | D | I | Y | Y | R | E | N | N | U | K | E | A | W | V |
C | P | D | L | R | U | O | Q | C | E | F | L | L | O | R | X | I | S | W | E | U |
T | C | W | C | T | C | C | L | A | O | S | C | B | O | T | K | E | O | E | C | A |
N | I | N | I | N | P | P | W | W | Y | C | G | U | E | V | C | Q | L | R | H | L |
L | I | O | E | Q | R | L | E | P | Q | A | J | O | S | H | C | B | C | I | N | S |
K | N | T | E | A | X | Q | D | H | N | W | T | D | F | J | M | B | T | F | S | W |
T | V | O | U | F | C | O | D | E | O | F | C | O | N | D | U | C | T | X | S | J |
A | M | E | K | K | C | Q | F | G | W | P | Y | X | M | L | F | J | L | E | R | E |
R | A | C | D | G | I | R | A | S | T | T | P | F | O | G | X | N | D | O | T | L |
Clues
- A common back up used for companies who rarely modify any data. (11, 6)
- A security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event. (5, 3)
- A verification method to ensure that data entered is as the user intended. (6, 5)
- An agreement signed by employees informing them of the rules within the workplace. (4, 2, 7)
- Changing data to machine readable format is also known as (8)
- Education of others is used to prevent malpractice one form of malpractice is the ..... of passwords (12)
- The form of input that means to measure and analyse some human characteristic in order to correctly identify an individual. (10)
- The name given to a piece of software designed to update a computer program or its supporting data, to fix or improve it. (8, 5)
- What does CCTV stand for? (6, 7, 2)
- What is the method given to prevent hackers gaining access to a computer system. (9)
Comments
No comments have yet been made