Topic 5: Security Polices Part 2

HideShow resource information
J N I E D A D M T A F Q B T L
P V A W J V E E M H U V A F O
A H A R D W A R E O U X C Y I
S V Q C M U C F F F K E K Q D
S B X H W S P U N I E T U F L
W G C V R E J Q U R Q R P B F
O O B O B R M L A E Y H X T P
R Q K T R I T W J W G B J E J
D F D R V D T O P A E C V S M
J G B N X F D C T L V V T W I
Y Y W M O M M L R L K G A H Q
C P X S J F U W V S D H G C H
U X F E L S Y M M E K L P A X
O H W L E B E W U N V H I T R
D W J S V B J W X S X R M E F

Clues

  • 2.The machines, wiring, and other physical components of a computer or other electronic system. (8)
  • a name or a number that is used to identify a certain user of network or system (4, 2)
  • a piece of software or hardware which protects a network from hackers (9)
  • a series of characters chosen by the user to access files (8)
  • copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system (4, 2)
  • The programs and other operating information used by a computer. (8)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »