ICT Key Words- A to E

?
C U Y F M K D E D H K C P I G B T E J Q A
O X O K W W W H S V J S H N L C C B K N R
N V M C G L Y X Y O C N I U A C A R M Y X
V L J Y C S L A Q I G T E Y S P N X B W Q
E H D Q V A E G M B U J M G T L O I I T G
R A X R F I T O K P A O D L C O I U O U D
G P N Q W S N F M C N G S B L T T E M O T
E S R O F O S O K O B Y M M L K C V E M Y
N I H J G E C I C A O X A Y E J E Y T K Q
C F I R B D N E E N L I R N G I T C R M B
E T E N U G L N L N W H Y D A K O L I P L
D M W O L A M E W I I V D S H A R Y C S T
X Y L F T T W B C G E J S N P X P B S H O
Y C T I M S T W R J A J B W P X A M S S X
N E G Q D X S K T E R T T Y M S T M S N A
U I C O M P U T E R M I S U S E A C T R X
D D I G I T A L D I V I D E M D D K I K R
C A R D C O D E V E R I F I C A T I O N L
O U N F K C E N O M P L V G V F W A D W O
I N M C D T G O A C E T P T N W R X G O Q
J T M X E A H Q Y J R A X O M T L W C R H

Clues

  • A set of numbers on the back of a credit card that help verify that the use of the credit card is legitimate.(CCV) (4, 4, 12)
  • A system in which all computer programs and data is stored on a central server and are accessed virtually. (5, 9)
  • An automated method of recognising a person based on physical characteristics such as fingerprints, iris and voice. (10)
  • It's the name given when one device is developed to carry out functions that were originally performed by several different devices (11)
  • The design of equipment to increase the efficiency of the way it is used by the human body to promote the health of users. (10)
  • The name given to unequal access to ICT for individuals or groups, usually due to financial, geographic, health or culture reasons (7, 6)
  • The sending of unwanted messages to other people through bluetooth connections (11)
  • This law protects copyright holders from criminals who illegally distribute copyrighted material (piracy) (7, 7, 3)
  • This law regulates how personal information is used and protests against of personal details. (4, 10, 3)
  • This law restricts people from accessing or modifying data without permission. (CMA) (8, 6, 3)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Key Words resources »