Topic 5: Security Polices Part 2 1.5 / 5 based on 2 ratings ? ICTPolicies, Security and LegislationA2/A-levelWJEC Created by: fatima jelaniCreated on: 12-11-12 15:50 a series of characters chosen by the user to access files Password 1 of 6 a piece of software or hardware which protects a network from hackers Firewalls 2 of 6 a name or a number that is used to identify a certain user of network or system User ID 3 of 6 copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system Back-up 4 of 6 2.The machines, wiring, and other physical components of a computer or other electronic system. Hardware 5 of 6 The programs and other operating information used by a computer. software 6 of 6
Comments
No comments have yet been made