3rd Quarter Review

12345678910111213141516
Across
  1. 4. Unauthorized access, use, and modification to software, computer system, and/or network.
  2. 7. an authentication process that permits a user to use one set of login credentials.
  3. 8. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. 9. A video, image, or audio recording created using AI that makes it look like someone said or did something they didn’t.
  5. 13. Technology that allows computers to perform tasks that normally require human intelligence
  6. 15. The ability to verify the identity of an entity/individual.
  7. 16. Using technology to perform tasks automatically without human involvement.
Down
  1. 1. The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  2. 2. The information used to teach an AI model how to recognize patterns or make decisions.
  3. 3. A type of AI where computers learn from data and improve their performance over time without being directly programmed for every step.
  4. 5. AI that creates new content such as text, images, music, or video.
  5. 6. When an AI gives false or made-up information but presents it as if it were true.
  6. 9. privacy Protecting personal information from being collected or used without permission.
  7. 10. The input or instruction given to an AI system to guide its response.
  8. 11. When an AI system produces unfair or inaccurate results because of the data it was trained on.
  9. 12. the fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information
  10. 14. Protection of information from being shared to unauthorized systems, entities, or individuals.