FITS : Mock Test Edition

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 3. An attack meant to shut down a machine or network, making it inaccessible to its intended users
  2. 4. The simulation of human intelligence processes by machines
  3. 5. A set of coded instructions that tells a computer how to run a task
  4. 9. A risk in digital transactions where the same balance is used more than once
  5. 12. Heavily reliant on digital technology
  6. 13. The state of being free from public attention or unsanctioned intrusion
  7. 15. An advanced setup incorporating functions of sensing, actuation, and control
  8. 20. Malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
  9. 21. Deceptive manipulation intended to result in financial or personal gain
  10. 22. A type of malware that is often disguised as legitimate software
  11. 24. A set of software tools that enable an unauthorized user to gain control of a computer system without being detected
  12. 25. The degree of intricacy or complication within a system or situation
  13. 26. Enhanced or enabled through the use of technology
  14. 29. Malicious software that replicates itself to spread to other computers
  15. 30. A holistic approach to analysis that focuses on the way a system's constituent parts interrelate
  16. 32. A secret or undocumented way of accessing a program, online service, or an entire computer system
  17. 33. A type of artificial intelligence that allows software applications to become more accurate in predicting outcomes
  18. 36. A network of physical devices that are connected and exchange data
  19. 37. The process of examining large and varied data sets to uncover hidden patterns
  20. 39. Measures to protect digital information and systems from unauthorized access
Down
  1. 1. A computer system that emulates the decision-making ability of a human expert
  2. 2. The study of how to handle personal and organizational data ethically
  3. 6. Excessively dependent on digital technology to the detriment of normal social interactions
  4. 7. Software that enables a user to obtain covert information about another's computer activities
  5. 8. Malicious software designed to spread to other computers and cause harm
  6. 9. A person who has grown up with digital technology
  7. 10. A method of problem-solving that involves a flexible and adaptive approach
  8. 11. An extended concept of the Internet of Things, encompassing not only devices but also people and processes
  9. 14. A network of private computers infected with malicious software and controlled as a group
  10. 16. The condition of being protected from or unlikely to cause danger or risk
  11. 17. A practical approach to problems and affairs
  12. 18. A computer attached to the Internet that has been compromised by a hacker
  13. 19. A type of currency available only in digital form
  14. 23. A digital or virtual currency that uses cryptography for security
  15. 27. The role focuses on analyzing data to help organizations make better decisions
  16. 28. A person who adopted digital technology later in life
  17. 31. Using technology to solve problems and make decisions
  18. 34. A network or circuit of neurons used in artificial intelligence
  19. 35. A set of things working together as parts of a mechanism or an interconnecting network
  20. 38. A type of data structure that is often used in memory management