Impact of Computing

12345678910111213141516171819202122
Across
  1. 1. Data that can be used to identify, locate, or contact individuals
  2. 3. Converting data into a secure form using algorithms
  3. 4. Uses a pair of keys, a public key for encryption and a private key for decryption
  4. 10. A cyber-attack where attackers impersonate legitimate entities
  5. 12. Research not done by scientists
  6. 14. Free and unrestricted online access
  7. 15. Outsourcing ideas to large groups of people via the internet
  8. 18. AI branch; enables computers to learn
  9. 19. Consequences that extend beyond original goals
  10. 21. Monitoring and recording keystrokes on a computer or device
  11. 22. Generic term for various types of malicious software
Down
  1. 2. Legal rights and protections for creations of the mind
  2. 5. Malicious software that infects a computer
  3. 6. Transformative technologies, systems, and ideas using computation
  4. 7. Prejudice that influence human decision making or behavior
  5. 8. Free source code
  6. 9. Gap between those who have access to modern communication and those who don't
  7. 11. Allows creators to share their works with specific permission
  8. 13. Two or more forms of verification
  9. 16. Electronic documents that verify the authenticity of a website
  10. 17. Uses a single key to both encrypt and decrypt data
  11. 20. Unauthorized wireless access point installed on a network