Introduction to Informational Technology

123456789101112131415161718192021222324252627282930313233
Across
  1. 3. To save a copy of files in a separate location.
  2. 5. Software that encrypts data on a computer system that cannot be unencrypted until the owner makes a financial payment.
  3. 9. Technology that connects traditionally "dumb" devices to the Internet and each other.
  4. 11. The control of data for the use of people and organizations, including data collection, distribution, archiving, removal, and security.
  5. 13. Facts, statistics, and other bits of information.
  6. 15. A file installed on a customer's device or web browser to track personal preferences or browsing activity.
  7. 16. Software that records information about your browsing history to display targeted advertising.
  8. 17. The use of unlicensed proprietary software.
  9. 18. A branch of artificial intelligence dedicated to enabling computers to understand human language.
  10. 20. The release of secure data into an unsecure environment.
  11. 21. The programs and other operating information used by a computer.
  12. 22. A legal agreement that controls the use and distribution of software.
  13. 23. The ability to accomplish something without wasting time or effort.
  14. 26. A set of laws that protect the right to control the use of creative, literary, or artistic work.
  15. 29. A device's ability to analyzed data and learn new skills from this data.
  16. 31. A computer that manages access to network resources.
  17. 32. A device that uses software, sensors, and communication technology to operate without human control.
  18. 33. Facts, details, or data.
Down
  1. 1. Translate text into code that appears to be random and meaningless.
  2. 2. Malware that blocks access to a system by sending a message that overloads the network.
  3. 4. The amount of work that someone accomplishes.
  4. 6. The systems such as computers and telecommunications used for storing, retrieving and exchanging information.
  5. 7. Hardware or software designed to block unauthorized access to a computer system or network.
  6. 8. An evolving form of decentralized data processing.
  7. 10. Software installed on a computer or network without the owner's knowledge or consent.
  8. 12. A group or system of interconnected technology devices.
  9. 14. Software designed to monitor data and allow unauthorized remote access to a computer system.
  10. 19. Malware sent by email that looks legitimate to convince the recipient into submitting personal information.
  11. 24. Using Internet servers to store programs and data.
  12. 25. The machines, wiring, and other physical components of a computer network.
  13. 27. A three-dimensional computer-generated environment.
  14. 28. A private network set up for use within a business or organization.
  15. 30. Layering computer-generated content over the real world.
  16. 31. Match two or more versions of the same information.