Made By Taylor

1234567891011121314151617181920212223
Across
  1. 2. A request for specific data from a database.
  2. 6. Group of files waiting in the buffer to be printed.
  3. 7. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  4. 11. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  5. 14. An electrical disturbance that can degrade communications
  6. 16. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
  7. 17. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
  8. 20. Technology-related health condition that affects eyesight. See also CVS
  9. 22. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme.
  10. 23. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
Down
  1. 1. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes.
  2. 3. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
  3. 4. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  4. 5. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
  5. 7. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require.
  6. 8. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost.
  7. 9. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money.
  8. 10. A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster.
  9. 12. The number of horizontal and vertical pixels in a display device
  10. 13. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  11. 15. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative.
  12. 18. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  13. 19. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.
  14. 21. The time it takes a signal to travel from one location to another on a network.