You are on page 1of 1

Name: Scction: Score:

Quiz in PQS
Complete the crossword puzzle below
1 2

5 6

7 8

10 11 12

13 14 15

16

17

18

19

20

Created using the Crossword Maker on TheTeachersCorner.net


Across Down
3. Is the prolonged malfunction of a computer. 1. Means making sure your computer is physically
7. Models are primarily intended to ensure that no clean in its operations.
unauthorized access to information is permitted 2. y involves a set of policies, tools, and procedures to
9. The quality which shows that the information has enable the recovery or continuation of vital technology
not been modified by third parties, and ensures its infra.
correctness. 4. Begins with some identification of the user or
10. Controls protect data that is stored on the network subject, an organizational entity that can access the
or which is in transit across, into or out of the network. database.
13. These controls apply to information systems 5. is official permission for something to happen or the
activities throughout an organization. act of giving someone official permission to do
14. Ensure the computer hardware is physically something.
secure and check for equipment malfunctions. 6. Is a broad term that covers a multitude of
16. System that holds the door for intruders and technologies, devices, and processes.
prevents them from accessing the resources by 8. Are methods and devices that attempt to ensure
verifying them as unauthorized. the accuracy, validity, and propriety of information
17. Refers to being able to access information system activities .
whenever necessary. 11. standard operating procedure
18. Monitor the use of system software and prevent 12. Check data for accuracy and completeness when
unauthorized access to software programs, system they enter the system.
failure. 15. Ensures critical business data on disk and tapes
19. Is an integrated set of components for collecting, are not subject to unauthorized access, change.
storing, and processing data and for delivering
information.
20. Allows trustful operations by guaranteeing that the
handler of information is whoever she or he claims to
be.

You might also like