chapter 2.7 and 2.8

?
  • Created by: shelly234
  • Created on: 28-03-17 18:21
L B O Y M E Q J E W U G A R S S V L G I V
E D M W E F I K S B I U Q P N A N D E G N
N T G F T N K Y A Q A E B L E F J T V L H
I U W X S G L U B P C G G B P E R F B T S
G D K Q Y N S X E N C A N L K T C I C P E
N I V T S P M Y G D I M I A R Y D U X Y L
E S H I L W S Y D O D A K C Y R E F E E N
E A Q A O O E X E D E D C K T E P H C X Q
C S N I R T H S L R N S A H I L V A K J X
N T H X T V C Y W J T U H A R A F D X N C
E E F B N J I I O O A O T T G T I C N O C
R R T A O D J T N U L I A H E E X B K N H
E P U K C R O A K C D C H A T D W K T V B
F L M Q W M R L Q O A I E C N S Y A T M X
N A U L W G H W T Q M L T K I Y A N K B V
I N F Q Y Q Q T A P A A I I A S S N K K O
R N H R W Y O H S G G M H N T T V H Y G N
C I I B G H W J L L E E W G A E I G C I L
J N X P W A S A V J R B P O D M A C O C M
A G X G C I L X J K C E O K C G D M K S V
G G P K M V V S C R E Q V U U D R T E E Y

Clues

  • a system that interacts with other electronics and or mechanical systems (7, 6)
  • Attempting to gain access to a computer system illegally (5, 3, 7)
  • Attempting to gain access to a system with permission from the system’s owner. they would use penetration testing to find any thing that could be exploited by hackers (5, 3, 7)
  • damage is when a person sets out with the specific intent to cause damage to data.  A hacker gaining access to a system and changing/deleting information  A virus, Trojan horse or worm being introduced to a system  An employee of an organisation d (9, 6)
  • dictates what question will be asked in an expert system (9, 6)
  • failure would result in injury or death (6, 7, 6)
  • keeping data intact and consistent (4, 9)
  • means unintentional. Data may be lost, but no one deliberately intended for it to be lost.  A person accidentally deleting a record  A computer or server crash  A loss of power before a file was saved (10, 6)
  • when natural diasters are a threat to data, data should be stored in an off-site location or, operate on a system of redundancy etc (8, 8)
  • where the human knowledge data is held in an expert system (9, 4)

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Software resources »