ICT Keywords Info 2 part 1 topics 1-4
- Created by: Laura Evans
- Created on: 31-05-13 16:48
W | H | A | T | A | Y | D | N | C | O | U | T | Y | H | R | M | E | S | D | N | X |
L | O | R | N | M | U | E | E | K | X | B | R | O | X | U | O | A | K | L | U | I |
A | W | F | N | K | O | R | T | L | P | I | A | A | P | R | F | A | C | P | T | U |
D | W | G | H | Y | N | N | W | Y | T | N | N | D | V | F | T | M | P | G | C | U |
H | F | S | K | Q | G | B | O | C | S | A | S | J | N | I | T | L | D | R | Q | W |
A | U | I | K | G | S | T | R | I | J | R | M | A | O | P | A | P | U | Y | C | Y |
K | V | E | M | N | K | A | K | N | R | Y | I | V | I | Y | E | I | W | W | N | U |
Y | Y | C | G | I | G | E | I | D | E | C | S | A | T | N | R | H | L | R | G | I |
I | M | I | M | S | A | R | N | I | Q | O | S | K | C | O | H | R | J | N | K | I |
C | O | T | R | S | A | H | G | T | L | D | I | U | A | I | T | N | P | I | P | H |
D | E | C | Y | E | H | T | S | I | V | E | O | I | S | T | L | I | G | D | J | B |
R | H | A | X | C | U | L | O | T | T | Y | N | J | N | A | A | D | I | C | U | R |
R | N | R | E | O | L | A | F | Y | S | N | M | G | A | M | N | S | P | T | C | V |
R | G | P | T | R | O | N | T | T | J | L | E | H | R | R | R | A | P | W | C | Q |
T | N | L | S | P | V | R | W | H | G | Y | D | P | T | O | E | W | M | E | F | T |
F | K | A | Y | M | B | E | A | E | S | U | I | I | F | F | T | E | S | N | D | Q |
O | F | M | D | E | M | T | R | F | I | G | U | H | H | N | N | H | C | P | S | X |
R | G | Y | Q | I | V | X | E | T | A | O | M | A | C | I | I | A | A | I | T | S |
H | N | W | I | L | V | E | P | Q | B | H | G | A | R | U | V | M | A | U | D | P |
L | T | K | C | Q | G | X | G | M | M | J | Y | R | W | I | T | W | Q | C | R | U |
S | D | M | N | X | S | J | T | J | A | V | B | Q | R | H | U | M | I | F | D | X |
Clues
- A piece of business informations, such as a return, order, purchase. (11)
- A threat to an ICT system that comes from inside the organisation. (8, 6)
- A threat to an ICT system that comes from outside the organisation. (8, 6)
- Careless use or misconduct of a computer system. (11)
- Code made up from a series of 1's and 0's (6, 4)
- Data that has been ordered and gives us knowledge and information. (11)
- Performing calculations or arranging the data into a meaningful order (10)
- Stealing information about you such as banking details and other personal information in order to commit fraud. (8, 5)
- Systems software that allows computers connected together to act like a network. (10, 8)
- The material that forms the connection between the computer systems in a network. (12, 6)
Comments
No comments have yet been made