INFO 2 Crossword
INFO 2 Keyword crossword
- Created by: M_Khan
- Created on: 10-03-13 00:23
V | A | W | Q | H | C | I | N | C | R | E | M | E | N | T | A | L | K |
P | Y | A | J | N | I | H | T | A | Q | T | C | U | E | Y | O | A | V |
C | I | K | T | E | Q | Q | T | Y | L | I | E | O | J | U | L | Y | Q |
F | S | G | L | T | J | B | I | M | A | C | U | G | C | X | A | Y | L |
L | Q | M | C | W | L | X | Y | T | I | N | L | O | R | V | P | Q | I |
V | W | Q | K | O | O | N | E | T | T | S | H | O | D | N | P | F | W |
A | K | E | B | R | S | N | C | V | N | L | R | P | K | O | U | T | M |
U | W | U | H | K | A | A | K | W | E | K | P | O | L | I | K | X | H |
J | J | P | G | R | R | E | G | G | R | I | J | J | G | T | C | W | T |
O | O | L | T | P | M | P | T | F | E | O | S | I | W | A | A | A | M |
A | U | N | L | I | U | M | I | O | F | P | R | C | N | M | B | W | U |
H | I | A | R | B | B | M | F | Q | F | D | I | U | M | R | L | B | J |
J | M | C | Y | S | X | A | L | I | I | A | I | H | N | O | L | A | O |
J | H | F | C | D | D | N | J | N | D | Y | L | S | W | F | U | X | I |
E | X | T | R | A | N | E | T | H | N | D | H | M | V | N | F | D | E |
E | N | C | O | D | E | M | P | Q | T | K | I | A | R | I | C | T | Q |
V | L | Q | S | G | B | W | U | W | D | D | W | F | P | U | E | B | T |
R | S | N | S | C | E | E | G | R | O | H | V | Q | U | Q | P | S | G |
Clues
- All the different data since the last back up (quickest time for back up, longest time for restore but uses the lowest amount of storage space) (11)
- An internal network giving users access to documents frequently needed and tools like email (8)
- Backs up all data stored (takes the longest time to back up, shortest time to restore and uses the most storage space). (4, 4, 2)
- Backs up all different data from the last full back up (backup, restore and storage space is in-between of full and incremental) (12)
- Breaking the law through computers e.g. Hacking, fraud, phishing, using other peoples accounts, creating viruses etc. (5)
- Doing something by mistake and is not illegal that is against the company ICT practice e.g. spam, not locking computer, giving password out etc. (11)
- Makes part of the network available to others outside of the company, commonly used with suppliers giving limited access to information e.g a catalogue and previous orders (8)
- Processed data with meaning e.g Brian, Lucy and Bob are names on a class register (11)
- Used by computers to convert data into a machine readable format (ASCII and Binary) This includes sound (wav, mp3), image (JPEG, Tif, RAW) and video (AVI, MOV) files (6)
- Where two or more computing devices are linked together to share data, communication, software and peripherals (7)
Comments
No comments have yet been made