chapter 2.7 and 2.8 0.0 / 5 ? ComputingSoftwaredata security and integrity processesHardware componentsA2/A-levelOther Created by: shelly234Created on: 28-03-17 18:21 10642715938 Across 1. read only, contents cant be changed or deleted, it is non volatile and it stores the bootstrap program needed to start up a computer (3) 3. using passwords, write protect or hiring empolyees without criminal backgrounds ore examples of (10) 4. where the human knowledge data is held in an expert system (9, 4) 8. a network that is local to an organisation such a business or school (8) 9. the people who develop the safety related system has to be (11) Down 2. use of technology to identify individuals based on biological markers, such as fingerprints and retinal scans (10) 5. a worldwide interconnection of computers and networking hardware (8) 6. whether the safety related system has a backup one (10) 7. unathorised acess, destruction or loss of data or storage and unauthorised acces are examples of? (7) 10. software is written to order for a specific client (7)
Comments
No comments have yet been made