Across
- 5. s a hole in the wall or in a machine where you can put a plug (noun)
- 8. AI-powered technology that responds to voice commands, such as Amazon's Alexa or Apple's Siri (2 words)
- 9. a decentralized, digital ledger technology that records transactions across multiple computers, ensuring transparency and security (noun)
- 14. the measurement and statistical analysis of people's unique physical and behavioral characteristics, such as fingerprints, for authentication (noun)
- 15. a thick wire that carries electricity or digital information (noun)
- 16. the practice of protecting systems, networks, and data from digital attacks, theft, or damage (noun)
- 18. science of developing and producing extremely small tools and machines by controlling the arrangement of atoms and molecules (noun)
- 20. the process of converting analog information into digital format, making it easier to store, transmit, and manipulate (noun)
- 22. a technique that creates three-dimensional images by recording light patterns (noun)
- 25. genetic modification of plants (noun)
- 27. a point where wires, pipes, etc join (noun)
- 29. a mobile phone that can be used as a small computer (noun)
- 30. a region in California known for its concentration of technology companies and innovation (2 words)
Down
- 1. the process of converting data into a code to prevent unauthorized access (noun)
- 2. the design and construction of robots, often used in manufacturing and automation (noun)
- 3. something you speak into to record your voice or make it sound louder (noun)
- 4. a system for connecting electronic devices to the internet without using wires (noun)
- 6. the process of discovering patterns or information in large datasets, often used for business and research purposes (2 words)
- 7. digital or virtual currencies that use cryptography for security, such as Bitcoin or Ethereum (noun)
- 10. the application of nanotechnology in the field of medicine for diagnosis, treatment, and drug delivery (noun)
- 11. the protection of personal information and the right to control how it is collected and used (2 words)
- 12. the use of digital communication tools to harass, threaten, or intimidate others (noun)
- 13. a person who gains unauthorized access to computer systems or networks, often with malicious intent (noun)
- 17. a document you add to an email message (noun)
- 19. unmanned aerial vehicles (UAVs) controlled remotely or autonomously for various purposes, including photography and surveillance (noun)
- 21. the provision of medical services and consultations remotely using telecommunications technology (noun)
- 23. a technology that superimposes computer-generated information, such as images or sound, onto the real world (compound noun)
- 24. a set of rules or instructions for solving a problem or accomplishing a task, often used in computer programming (noun)
- 26. introducing new ideas, methods, or products, especially in the field of technology (adj)
- 28. a group of computers,machines or people which are connected (noun)