chapter 2.7 and 2.8
- Created by: shelly234
- Created on: 28-03-17 18:21
L | B | O | Y | M | E | Q | J | E | W | U | G | A | R | S | S | V | L | G | I | V |
E | D | M | W | E | F | I | K | S | B | I | U | Q | P | N | A | N | D | E | G | N |
N | T | G | F | T | N | K | Y | A | Q | A | E | B | L | E | F | J | T | V | L | H |
I | U | W | X | S | G | L | U | B | P | C | G | G | B | P | E | R | F | B | T | S |
G | D | K | Q | Y | N | S | X | E | N | C | A | N | L | K | T | C | I | C | P | E |
N | I | V | T | S | P | M | Y | G | D | I | M | I | A | R | Y | D | U | X | Y | L |
E | S | H | I | L | W | S | Y | D | O | D | A | K | C | Y | R | E | F | E | E | N |
E | A | Q | A | O | O | E | X | E | D | E | D | C | K | T | E | P | H | C | X | Q |
C | S | N | I | R | T | H | S | L | R | N | S | A | H | I | L | V | A | K | J | X |
N | T | H | X | T | V | C | Y | W | J | T | U | H | A | R | A | F | D | X | N | C |
E | E | F | B | N | J | I | I | O | O | A | O | T | T | G | T | I | C | N | O | C |
R | R | T | A | O | D | J | T | N | U | L | I | A | H | E | E | X | B | K | N | H |
E | P | U | K | C | R | O | A | K | C | D | C | H | A | T | D | W | K | T | V | B |
F | L | M | Q | W | M | R | L | Q | O | A | I | E | C | N | S | Y | A | T | M | X |
N | A | U | L | W | G | H | W | T | Q | M | L | T | K | I | Y | A | N | K | B | V |
I | N | F | Q | Y | Q | Q | T | A | P | A | A | I | I | A | S | S | N | K | K | O |
R | N | H | R | W | Y | O | H | S | G | G | M | H | N | T | T | V | H | Y | G | N |
C | I | I | B | G | H | W | J | L | L | E | E | W | G | A | E | I | G | C | I | L |
J | N | X | P | W | A | S | A | V | J | R | B | P | O | D | M | A | C | O | C | M |
A | G | X | G | C | I | L | X | J | K | C | E | O | K | C | G | D | M | K | S | V |
G | G | P | K | M | V | V | S | C | R | E | Q | V | U | U | D | R | T | E | E | Y |
Clues
- a system that interacts with other electronics and or mechanical systems (7, 6)
- Attempting to gain access to a computer system illegally (5, 3, 7)
- Attempting to gain access to a system with permission from the system’s owner. they would use penetration testing to find any thing that could be exploited by hackers (5, 3, 7)
- damage is when a person sets out with the specific intent to cause damage to data. A hacker gaining access to a system and changing/deleting information A virus, Trojan horse or worm being introduced to a system An employee of an organisation d (9, 6)
- dictates what question will be asked in an expert system (9, 6)
- failure would result in injury or death (6, 7, 6)
- keeping data intact and consistent (4, 9)
- means unintentional. Data may be lost, but no one deliberately intended for it to be lost. A person accidentally deleting a record A computer or server crash A loss of power before a file was saved (10, 6)
- when natural diasters are a threat to data, data should be stored in an off-site location or, operate on a system of redundancy etc (8, 8)
- where the human knowledge data is held in an expert system (9, 4)
Similar Computing resources:
Teacher recommended
Comments
No comments have yet been made