IT Fundamentals Chapter 1
Across
- 3. creations of the mind that one can own
- 6. the satisfaction of the computer needs that businesses, schools, governments, and other organizations have
- 10. the study of computers and computing concepts
- 11. light emitted from electronic devices
- 12. the use of a company's internet connection for personal use on company time by employees
- 13. the requirement of Internet Service Providers to allow equal access to all web content
- 14. the use of malicious attacks on networks and websites for the purpose of promoting social change
- 15. energy-efficiency in computing devices
- 16. the publishing of another person’s phone number, address, and other personal information on the internet
Down
- 1. machines achieving a level of superintelligence that surpasses our own
- 2. the reduction of potential health problems by transforming employee workspaces
- 4. a network of encrypted content that allows users to engage in untraceable activity
- 5. personal behaviors that build responsibility and trust
- 7. the use of traffic cameras, surveillance footage, and social media postings by law enforcement agencies to prevent crimes before they're actually committed
- 8. the collection and utilization of data
- 9. the use of digital tools to track work, employee performance, and work by companies