Across
- 2. Measures and practices designed to protect digital systems, networks, and data from unauthorized access, cyberattacks, and data breaches.
- 6. The simulation of human intelligence processes by machines, including learning, reasoning, and problem-solving.
- 9. A subset of artificial intelligence that enables systems to automatically learn and improve from experience without being explicitly programmed.
- 10. Obtaining ideas, services, or content by soliciting contributions from a large group of people, often done through online platforms or communities.
- 13. Digital or virtual currencies that use cryptography for security and operate independently of a central authority, such as Bitcoin or Ethereum.
Down
- 1. A marketing technique that aims to spread information or promote products through social sharing and word-of-mouth, often leveraging online platforms.
- 3. A decentralized and distributed digital ledger technology used to record transactions across multiple computers securely and transparently.
- 4. Part of the internet that is not indexed by search engines and requires special software or authorization to access, often associated with illicit activities.
- 5. The network of interconnected devices (such as smartphones, wearable gadgets, and home appliances) that can communicate and exchange data over the internet.
- 7. Buying and selling goods or services over the internet, often through online marketplaces, websites, or mobile apps.
- 8. Large and complex data sets that can be analyzed computationally to reveal patterns, trends, and associations, often used for business intelligence and decision-making.
- 11. Adding geographical metadata (such as coordinates or location names) to digital content, such as photos or social media posts.
- 12. Content, such as headlines or thumbnails, designed to attract attention and encourage clicks, often sensationalized or misleading.