Information Technology Vocabulary

1234567891011121314151617181920212223
Across
  1. 2. Malicious software that encrypts files, then makes demands to decrypt them.
  2. 7. Measurable value that indicates how well a process is working.
  3. 9. Attacks that overload a network, making it unusable.
  4. 12. A type of threat in which employees gain access to data for the purposes of leaking it.
  5. 14. A business approach focusing on increasing efficiency by reducing waste.
  6. 15. A stage during a process that slows down its workflow.
  7. 17. Malicious software using viruses, spyware and Trojans that harm devices and manipulate data.
  8. 20. Improving processes to make them more effective.
  9. 21. A computing paradigm that uses qubits for processing.
  10. 22. Attacks involving the insertion of malicious code into websites in order to steal data.
  11. 23. The use of consistent procedures that improve efficiency.
Down
  1. 1. A software that allows multiple virtual machines to run on a single physical machine.
  2. 3. Techniques used to reduce defects in processes.
  3. 4. Using technology to perform tasks without human intervention.
  4. 5. The capacity to complete tasks with minimal waste of resources.
  5. 6. A technology that packages software and its dependencies into standardized units.
  6. 8. A type of processing that allows running multiple processes at the same time to increase efficiency.
  7. 10. The capacity to handle increasing levels of work.
  8. 11. The sequence of tasks involved in completing a process.
  9. 13. Amount of work that's completed during a specific time period.
  10. 16. The process of running computations closer to data sources to reduce latency.
  11. 18. The process of creating virtual instances of servers, storage, and networks.
  12. 19. A system that breaks an application into small, independent services that work together.