Across
- 3. a simulated experience that employs pose tracking and 3D near-eye displays to give the user an immersive feel of a virtual world
- 6. a string of characters that allows access to a computer system or service
- 9. methods, systems, and devices which are the result of scientific knowledge being used for practical purposes.
- 11. allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area
- 13. a computer network that links devices within a building or group of adjacent buildings.
- 14. software used by computers to mimic aspects of human intelligence
Down
- 1. piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 2. type of security that protects the integrity of a computer network and the data within it.
- 4. branch of technology that deals with the design, construction, operation, and application of robots branch of technology that deals with the design, construction, operation, and application of robots
- 5. any hardware device used to send data from a computer to another device or user
- 6. the type of security that deals with personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage.
- 7. any kind of unwanted, unsolicited digital communication that gets sent out in bulk
- 8. any hardware device that sends data to a computer, allowing you to interact with and control it.
- 10. a computer network that spans a limited geographic area and interconnects multiple local area networks
- 12. type of scan that is 20,000 times more accurate than a fingerprint