Midterm Vocabulary Review Crossword

12345678910111213141516171819202122232425262728293031323334353637
Across
  1. 4. A function that calculates the midpoint value of a range of data.
  2. 6. The trail of data left behind by individuals on the internet, including their online activities, interactions, and information.
  3. 7. The combination of the impact of a negative event with the likelihood of that event happening.
  4. 12. The use of deception to manipulate individuals into giving away sensitive information or making risky decisions.
  5. 13. Any program designed to compromise a computer's security.
  6. 15. A vertical group of cells in a worksheet identified by letters.
  7. 18. Something of value that needs protection from accidental damage and intentional harm.
  8. 20. A symbol that tells Google Sheets you are including all cells from the first referenced cell to the last referenced cell.
  9. 21. A document that may contain multiple worksheets.
  10. 24. A symbol that lets Google Sheets know you're going to do a calculation.
  11. 25. A function that calculates the mean of a range of data.
  12. 26. An individual or group seeking to breach or undermine systems and data security.
  13. 29. The act of using someone's personal information to access or open accounts in their name.
  14. 30. A flaw or weakness that may allow harm to an asset.
  15. 34. An attempt to damage, destroy, or gain access to a computer network or system.
  16. 35. The use of unique biological traits, such as fingerprints or facial recognition, to authenticate and grant access to systems or devices.
Down
  1. 1. The process of verifying the identity of a user, device, or system.
  2. 2. A single page of cells in Google Sheets.
  3. 3. Formatting that is applied to a cell based on specific criteria.
  4. 5. A symbol used to multiply cell values together.
  5. 8. The consequences of assets being compromised or destroyed.
  6. 9. Deceptive actions intended to result in financial or personal gain.
  7. 10. A computer application, device, or system that can cause damage.
  8. 11. A symbol used to subtract cell values from one another.
  9. 12. A function that allows a range of cell values to be added together.
  10. 14. An authentication method that requires users to provide two or more forms of identification or verification to access a system or account.
  11. 16. The probability of an event occurring.
  12. 17. A single box on a spreadsheet.
  13. 19. The act of falsifying data or identity information to mimic a legitimate source with the intent to deceive or gain unauthorized access.
  14. 22. Symbols used to enclose a range of cells in a function.
  15. 23. A function that identifies the largest value in a group.
  16. 27. The practice of protecting systems, networks, and programs from digital attacks.
  17. 28. A function that identifies the smallest value in a group.
  18. 31. A security process that requires users to provide two distinct methods to confirm their identity.
  19. 32. Emailing pretending to be from a known source to trick users into revealing their login credentials.
  20. 33. A group of multiple cells that run across a row or column.
  21. 36. A function that calculates the most common value in a range of data.
  22. 37. A horizontal group of cells in a worksheet identified by numbers.