Introduction to Informational Technology
Across
- 3. To save a copy of files in a separate location.
- 5. Software that encrypts data on a computer system that cannot be unencrypted until the owner makes a financial payment.
- 9. Technology that connects traditionally "dumb" devices to the Internet and each other.
- 11. The control of data for the use of people and organizations, including data collection, distribution, archiving, removal, and security.
- 13. Facts, statistics, and other bits of information.
- 15. A file installed on a customer's device or web browser to track personal preferences or browsing activity.
- 16. Software that records information about your browsing history to display targeted advertising.
- 17. The use of unlicensed proprietary software.
- 18. A branch of artificial intelligence dedicated to enabling computers to understand human language.
- 20. The release of secure data into an unsecure environment.
- 21. The programs and other operating information used by a computer.
- 22. A legal agreement that controls the use and distribution of software.
- 23. The ability to accomplish something without wasting time or effort.
- 26. A set of laws that protect the right to control the use of creative, literary, or artistic work.
- 29. A device's ability to analyzed data and learn new skills from this data.
- 31. A computer that manages access to network resources.
- 32. A device that uses software, sensors, and communication technology to operate without human control.
- 33. Facts, details, or data.
Down
- 1. Translate text into code that appears to be random and meaningless.
- 2. Malware that blocks access to a system by sending a message that overloads the network.
- 4. The amount of work that someone accomplishes.
- 6. The systems such as computers and telecommunications used for storing, retrieving and exchanging information.
- 7. Hardware or software designed to block unauthorized access to a computer system or network.
- 8. An evolving form of decentralized data processing.
- 10. Software installed on a computer or network without the owner's knowledge or consent.
- 12. A group or system of interconnected technology devices.
- 14. Software designed to monitor data and allow unauthorized remote access to a computer system.
- 19. Malware sent by email that looks legitimate to convince the recipient into submitting personal information.
- 24. Using Internet servers to store programs and data.
- 25. The machines, wiring, and other physical components of a computer network.
- 27. A three-dimensional computer-generated environment.
- 28. A private network set up for use within a business or organization.
- 30. Layering computer-generated content over the real world.
- 31. Match two or more versions of the same information.