Info 2 Key Terms 0.0 / 5 ? ICTInfo 2ASAQA Created by: jessicabrown00Created on: 21-03-17 13:54 210531784 Across 1. Usually covers a single site and could be linked by the use of cables (5, 4, 7, 3) 2. When individuals or organisations break the law through using computers to illegally access a computer system (5) 3. Used by computers to convert the data into machine readable form (8) 4. Acts as a barrier between the public internet and your private computer or network, and blocks threats including some viruses (8) 8. Hardware device (wired or wireless) that joins networks together at the network protocol layer (6) Down 2. When an organisation's computer system is interrupted by some form of disaster including power cuts, fire, flood and terrorist attack (8, 6) 3. Technology that enables instant, automatic payment directly from the customer's bank account when a debit card is used (6) 5. A set of known rules that govern the communications between computers on a network (9) 7. A piece of malicious code that is written by programmers and use to corrupt data and systems. It comes in different forms, such as trojans, logic bombs and worms (5) 10. Some data is coded on collection before being entered and this changed the original data into a shortened version by assigning a code (6)
TOPIC 1:Data, Information, Knowledge & Processing (ICT AS OCR New Spec For First Teaching 2008) 0.0 / 5
Comments
No comments have yet been made