Topic 5: Security Polices Part 2 1.5 / 5 based on 2 ratings ? ICTPolicies, Security and LegislationA2/A-levelWJEC Created by: fatima jelaniCreated on: 12-11-12 15:50 324615 Across 1. The programs and other operating information used by a computer. (8) 5. a name or a number that is used to identify a certain user of network or system (4, 2) Down 2. a series of characters chosen by the user to access files (8) 3. 2.The machines, wiring, and other physical components of a computer or other electronic system. (8) 4. a piece of software or hardware which protects a network from hackers (9) 6. copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system (4, 2)
Comments
No comments have yet been made