ICT Key Words- A to E
- Created by: MeggyMoo1516
- Created on: 12-04-15 18:04
C | U | Y | F | M | K | D | E | D | H | K | C | P | I | G | B | T | E | J | Q | A |
O | X | O | K | W | W | W | H | S | V | J | S | H | N | L | C | C | B | K | N | R |
N | V | M | C | G | L | Y | X | Y | O | C | N | I | U | A | C | A | R | M | Y | X |
V | L | J | Y | C | S | L | A | Q | I | G | T | E | Y | S | P | N | X | B | W | Q |
E | H | D | Q | V | A | E | G | M | B | U | J | M | G | T | L | O | I | I | T | G |
R | A | X | R | F | I | T | O | K | P | A | O | D | L | C | O | I | U | O | U | D |
G | P | N | Q | W | S | N | F | M | C | N | G | S | B | L | T | T | E | M | O | T |
E | S | R | O | F | O | S | O | K | O | B | Y | M | M | L | K | C | V | E | M | Y |
N | I | H | J | G | E | C | I | C | A | O | X | A | Y | E | J | E | Y | T | K | Q |
C | F | I | R | B | D | N | E | E | N | L | I | R | N | G | I | T | C | R | M | B |
E | T | E | N | U | G | L | N | L | N | W | H | Y | D | A | K | O | L | I | P | L |
D | M | W | O | L | A | M | E | W | I | I | V | D | S | H | A | R | Y | C | S | T |
X | Y | L | F | T | T | W | B | C | G | E | J | S | N | P | X | P | B | S | H | O |
Y | C | T | I | M | S | T | W | R | J | A | J | B | W | P | X | A | M | S | S | X |
N | E | G | Q | D | X | S | K | T | E | R | T | T | Y | M | S | T | M | S | N | A |
U | I | C | O | M | P | U | T | E | R | M | I | S | U | S | E | A | C | T | R | X |
D | D | I | G | I | T | A | L | D | I | V | I | D | E | M | D | D | K | I | K | R |
C | A | R | D | C | O | D | E | V | E | R | I | F | I | C | A | T | I | O | N | L |
O | U | N | F | K | C | E | N | O | M | P | L | V | G | V | F | W | A | D | W | O |
I | N | M | C | D | T | G | O | A | C | E | T | P | T | N | W | R | X | G | O | Q |
J | T | M | X | E | A | H | Q | Y | J | R | A | X | O | M | T | L | W | C | R | H |
Clues
- A set of numbers on the back of a credit card that help verify that the use of the credit card is legitimate.(CCV) (4, 4, 12)
- A system in which all computer programs and data is stored on a central server and are accessed virtually. (5, 9)
- An automated method of recognising a person based on physical characteristics such as fingerprints, iris and voice. (10)
- It's the name given when one device is developed to carry out functions that were originally performed by several different devices (11)
- The design of equipment to increase the efficiency of the way it is used by the human body to promote the health of users. (10)
- The name given to unequal access to ICT for individuals or groups, usually due to financial, geographic, health or culture reasons (7, 6)
- The sending of unwanted messages to other people through bluetooth connections (11)
- This law protects copyright holders from criminals who illegally distribute copyrighted material (piracy) (7, 7, 3)
- This law regulates how personal information is used and protests against of personal details. (4, 10, 3)
- This law restricts people from accessing or modifying data without permission. (CMA) (8, 6, 3)
Comments
No comments have yet been made