Across
- 1. Computer programs that download to your computer or network without your permission; programs designed to disrupt computer operations
- 3. Facts and figures
- 5. Acquiring assistance from outside organizations/consultants to obtain goods or services to accomplish business objectives or perform primary business activities
- 7. An organization’s ability to function during and after a disaster
- 8. Undisclosed information within a particular business or industry
- 10. Choosing among alternatives
- 14. A computer network connected without the use of wires or cables
- 16. Converting facts and figures into useful information
- 17. Unauthorized access to a computer system
- 19. An integrated technology that assists with an organization’s information management needs
Down
- 2. Communication that is too much and/or comes too fast to process at one time
- 4. Private information that belongs to an organization and cannot be released to the public
- 6. Process by which an organization’s accounts and records are verified
- 9. The process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts, or data for the purpose of assisting business decision-making
- 11. Stability; regularity
- 12. Data presented in a useful form
- 13. Fulfilling the requirements of the law
- 15. Junk email that the recipient did not request; also known as unsolicited commercial email
- 18. regulation mandating that public businesses comply with specific accounting requirements
