Across
- 3. An attack meant to shut down a machine or network, making it inaccessible to its intended users
- 4. The simulation of human intelligence processes by machines
- 5. A set of coded instructions that tells a computer how to run a task
- 9. A risk in digital transactions where the same balance is used more than once
- 12. Heavily reliant on digital technology
- 13. The state of being free from public attention or unsanctioned intrusion
- 15. An advanced setup incorporating functions of sensing, actuation, and control
- 20. Malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
- 21. Deceptive manipulation intended to result in financial or personal gain
- 22. A type of malware that is often disguised as legitimate software
- 24. A set of software tools that enable an unauthorized user to gain control of a computer system without being detected
- 25. The degree of intricacy or complication within a system or situation
- 26. Enhanced or enabled through the use of technology
- 29. Malicious software that replicates itself to spread to other computers
- 30. A holistic approach to analysis that focuses on the way a system's constituent parts interrelate
- 32. A secret or undocumented way of accessing a program, online service, or an entire computer system
- 33. A type of artificial intelligence that allows software applications to become more accurate in predicting outcomes
- 36. A network of physical devices that are connected and exchange data
- 37. The process of examining large and varied data sets to uncover hidden patterns
- 39. Measures to protect digital information and systems from unauthorized access
Down
- 1. A computer system that emulates the decision-making ability of a human expert
- 2. The study of how to handle personal and organizational data ethically
- 6. Excessively dependent on digital technology to the detriment of normal social interactions
- 7. Software that enables a user to obtain covert information about another's computer activities
- 8. Malicious software designed to spread to other computers and cause harm
- 9. A person who has grown up with digital technology
- 10. A method of problem-solving that involves a flexible and adaptive approach
- 11. An extended concept of the Internet of Things, encompassing not only devices but also people and processes
- 14. A network of private computers infected with malicious software and controlled as a group
- 16. The condition of being protected from or unlikely to cause danger or risk
- 17. A practical approach to problems and affairs
- 18. A computer attached to the Internet that has been compromised by a hacker
- 19. A type of currency available only in digital form
- 23. A digital or virtual currency that uses cryptography for security
- 27. The role focuses on analyzing data to help organizations make better decisions
- 28. A person who adopted digital technology later in life
- 31. Using technology to solve problems and make decisions
- 34. A network or circuit of neurons used in artificial intelligence
- 35. A set of things working together as parts of a mechanism or an interconnecting network
- 38. A type of data structure that is often used in memory management
