Topic 5: Security Polices Part 2

?
a series of characters chosen by the user to access files
Password
1 of 6
a piece of software or hardware which protects a network from hackers
Firewalls
2 of 6
a name or a number that is used to identify a certain user of network or system
User ID
3 of 6
copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system
Back-up
4 of 6
2.The machines, wiring, and other physical components of a computer or other electronic system.
Hardware
5 of 6
The programs and other operating information used by a computer.
software
6 of 6

Other cards in this set

Card 2

Front

a piece of software or hardware which protects a network from hackers

Back

Firewalls

Card 3

Front

a name or a number that is used to identify a certain user of network or system

Back

Preview of the front of card 3

Card 4

Front

copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system

Back

Preview of the front of card 4

Card 5

Front

2.The machines, wiring, and other physical components of a computer or other electronic system.

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »