chapter 2.7 and 2.8 0.0 / 5 ? ComputingSoftwaredata security and integrity processesHardware componentsA2/A-levelOther Created by: shelly234Created on: 28-03-17 18:21 28457931016 Across 1. software is written to order for a specific client (7) 6. techniques that make data unreadable can be used by the police or military (12) 7. main memory, stores programs currently being executed or data needed for immediate use it is also volatile (3) 8. dictates what question will be asked in an expert system (9, 6) Down 2. where the human knowledge data is held in an expert system (9, 4) 3. can be known as cpu cache, intended to store commonly used data and instructions, the data can also be accesed more quickly (6, 5) 4. software typically purchased online or instore (3, 3, 5) 5. any program that works against the interests of you or your computer. Viruses, worms, Trojans, adware and spyware are types of malware (7) 9. whether the safety related system has a backup one (10) 10. source code that is visible and can be modified by its users (4, 6)
Comments
No comments have yet been made