ICT Key Words- A to E

HideShow resource information
G K L N R D I G I T A L D I V I D E P O K
Y T R K H T L S S J T P B S H R I J G C H
I U K D I G I T A L E C O N O M Y A C T D
N O E O M D O R C H L C U D O Q M H X T B
T V J O P W S A A S D F R D K B S G V U W
A C C E P T A B L E U S E P O L I C Y R D
Y J X B B L U E T O O T H D E U N B M H Y
I B X M O U O L N W H W M J C U W C L K H
A T D N D Q Q L V N Q M H F D E K P E W V
F P J V M T N F N V B Y X J B H A N K M B
X T A E C M J W C T N N R M C H F X S K V
G M N C W M J X Q O Y K W R M F M I E N T
O C L O U D C O M P U T I N G Y R K C D Y
D A T A P R O T E C T I O N A C T N F G M
M W C O M P U T E R M I S U S E A C T I B
X G E R G O N O M I C S H A Y F A I X O E
M E R A K C L O B C P K K I P Y G V W X X
J P C C K P N E D C O N V E R G E N C E P
S B E N S I O P U B I O M E T R I C S K W
I Y N F C Q K G W J Y W I Q O G E A Q S V
T N D Q P Q M D A Q J X W N C P G P Y K J

Clues

  • A system in which all computer programs and data is stored on a central server and are accessed virtually. (5, 9)
  • Allows the exchange of data over short distances from fixed or mobile devices (can't travel through walls like WiFi can) (9)
  • An automated method of recognising a person based on physical characteristics such as fingerprints, iris and voice. (10)
  • It's the name given when one device is developed to carry out functions that were originally performed by several different devices (11)
  • Rules to which users agree, to reduce the misuse of ICT (Ac....... u.. po..cy) (10, 3, 6)
  • The design of equipment to increase the efficiency of the way it is used by the human body to promote the health of users. (10)
  • The name given to unequal access to ICT for individuals or groups, usually due to financial, geographic, health or culture reasons (7, 6)
  • This law protects copyright holders from criminals who illegally distribute copyrighted material (piracy) (7, 7, 3)
  • This law regulates how personal information is used and protests against of personal details. (4, 10, 3)
  • This law restricts people from accessing or modifying data without permission. (CMA) (8, 6, 3)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Key Words resources »