ICT

?
  • Created by: Andrew
  • Created on: 18-04-17 13:59
R F I L E C O M P R E S S I O N H V M I M
W C E R R O N E O U S D A T A I T E N E C
O A B U A N C D D P R M Q H T M V R K X A
R C H M P B C W D N E M N R A I O I W X K
L C D K X O X V E B L S T L D X I F E D Y
D E C L C Y I B H P A O K E E S C I S O S
W S D U A J D J W E T R O S R H Q C U W B
I S J X A K B T G K I C O F E G J A S P W
D R G P U Y R G M I O Y Q S M P W T E B Y
E I C E H I B U Y N N P Q L O L H I R R T
W G R D K M Q V F J A P F U V I S O I S P
E H L A F W S E J G L C X J A Y P N N B S
B T S H H A R S J Y D L B O B G J H T B B
W S P S O E G M F K A G T B L U W M E X T
W T R A N S C R I P T I O N E R R O R S L
W R G C F Y A V P R A Y X C M Q A E F P C
M D I H D M C M W X B O Y P E F I P A A O
B N B K W V X L B G A M M M D W R P C F J
G S T P S U M B A T S O D E I O W V E V O
W W I E D W A Q F D E I H E A I Q O U Y W
B Q G V K C K A Y J D E O J V M I B G K B

Clues

  • a check to make sure that data has not been corrupted as it is copied between different parts of a computer system or entered from a source document (12)
  • a collection of multimedia resources accessible via the Internet (5, 4, 3, 3)
  • allow users to do different things. A file might be marked 'read only', so that only users with the password can change it. In a big system, different parts might have different access rights (6, 6)
  • can occur when data is being transferred manually, usually from paper-based document. For example an examination mark written on the sheet as 87 might be entered as 57 because the number 8 wasn't written clearly enough (13, 6)
  • captures and transmits sound and video to allow people in different locations to see and talk to each other (5, 12)
  • data that is inappropriate. If possible, validation checks should reject this kind of data, but if this is not possible, it is important that the system can continue to operate (9, 4)
  • reducing the size of a file by converting it to a different file format (4, 11)
  • stores data in tables that are linked together through primary keys. A primary key provides a unique identifier for each field (10, 8)
  • the link between the user and the technology that they are using; involves both hardware and software (4, 9)
  • used to store data so that it can be taken away from the computer, such as floppy discs, CDs, and flash memory (9, 5)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Data and Information resources »