Topic 5: Security Polices Part 2

HideShow resource information
B U L K X E C J J X T U Q M L
H A R D W A R E Q A G D S B V
L R A H D M S G P H M T L S E
A N Y H N E P M V V O S C P N
B H V G L I V K X X L P G V R
A S O F T W A R E L U N S I N
A H A F F L P R A K N N T A P
O J U G M P N W C N O T M P I
Y S S W Y Y E A O N N H Q O V
D F E N C R B L E N C E R P U
V H R Q I S V I L V P L S J K
A X I F D P A S S W O R D P Y
T C D I J C I O H H T O H Y E
Y B A R K H U B M L W K U B C
T C E W O I K U M E T B O G L

Clues

  • 2.The machines, wiring, and other physical components of a computer or other electronic system. (8)
  • a name or a number that is used to identify a certain user of network or system (4, 2)
  • a piece of software or hardware which protects a network from hackers (9)
  • a series of characters chosen by the user to access files (8)
  • copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system (4, 2)
  • The programs and other operating information used by a computer. (8)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »