1:00
en
CR
Data protection
27
unauthorised : do not have permission
receptionist : someone to monitor the entrance to building
swipecard : security measure to restrict access
logoff : what to do when leaving your computer
password : protect your user account
document : can be protected with a password
strong : the kind of password you should use
symbols : passwords should contain at least one of these
name : passwords should not contain
share : do not do this with a password
virus : a program that steals information
multiplies : a worm does this to itself
trojan : a program that sneaks in pretending to be something else
backdoor : a type of trojan
update : should be regularly done to antivirus software
Defender : built in component of Windows to protect against virus'
firewall : blocks other users from accessing your computer from the internet
hardware : all components of a computer system you can touch
software : programs written for a computer
trackingspyware : programs that records keystrokes and screenshots
surge : a spike can blow circuits in your computer
lightning : can cause a power surge
corrupt : a file that is unable to be read, is .........
save : what you should regularly do when working on a document
backup : to have a copy of your data
harddrive : if this hardware fails you cannot retrieve your data from it
compress : the effect of zipping files
Data protection
Across:| 2. | protect your user account | | 5. | blocks other users from accessing your computer from the internet | | 7. | can be protected with a password | | 9. | should be regularly done to antivirus software | | 14. | a program that steals information | | 15. | passwords should not contain | | 16. | the kind of password you should use | | 17. | a worm does this to itself | | 19. | can cause a power surge | | 22. | a type of trojan | | 23. | if this hardware fails you cannot retrieve your data from it | | 24. | what you should regularly do when working on a document | | 25. | programs written for a computer | | 26. | do not have permission |
| | Down:| 1. | do not do this with a password | | 3. | built in component of Windows to protect against virus' | | 4. | to have a copy of your data | | 6. | someone to monitor the entrance to building | | 8. | the effect of zipping files | | 10. | a file that is unable to be read, is ......... | | 11. | programs that records keystrokes and screenshots | | 12. | passwords should contain at least one of these | | 13. | a program that sneaks in pretending to be something else | | 16. | a spike can blow circuits in your computer | | 18. | what to do when leaving your computer | | 20. | all components of a computer system you can touch | | 21. | security measure to restrict access |
| |
© 2016
PuzzleFast.com, Noncommercial Use Only
Data protection
Across:| 2. | protect your user account | | 5. | blocks other users from accessing your computer from the internet | | 7. | can be protected with a password | | 9. | should be regularly done to antivirus software | | 14. | a program that steals information | | 15. | passwords should not contain | | 16. | the kind of password you should use | | 17. | a worm does this to itself | | 19. | can cause a power surge | | 22. | a type of trojan | | 23. | if this hardware fails you cannot retrieve your data from it | | 24. | what you should regularly do when working on a document | | 25. | programs written for a computer | | 26. | do not have permission |
| | Down:| 1. | do not do this with a password | | 3. | built in component of Windows to protect against virus' | | 4. | to have a copy of your data | | 6. | someone to monitor the entrance to building | | 8. | the effect of zipping files | | 10. | a file that is unable to be read, is ......... | | 11. | programs that records keystrokes and screenshots | | 12. | passwords should contain at least one of these | | 13. | a program that sneaks in pretending to be something else | | 16. | a spike can blow circuits in your computer | | 18. | what to do when leaving your computer | | 20. | all components of a computer system you can touch | | 21. | security measure to restrict access |
| |
© 2016
PuzzleFast.com, Noncommercial Use Only