Across
- 3. Software designed to monitor data and allow unauthorized remote access to a computer system.
- 4. An evolving form of decentralized data processing.
- 7. Translate text into code that appears to be random and meaningless.
- 10. A legal agreement that controls the use and distribution of software.
- 11. Software that records information about your browsing history to display targeted advertising.
- 12. To save a copy of files in a separate location.
- 16. A computer that manages access to network resources.
- 17. Match two or more versions of the same information.
- 19. A device's ability to analyzed data and learn new skills from this data.
- 20. Facts, statistics, and other bits of information.
- 22. The ability to accomplish something without wasting time or effort.
- 26. The use of unlicensed proprietary software.
- 27. The machines, wiring, and other physical components of a computer network.
- 28. The programs and other operating information used by a computer.
- 29. Layering computer-generated content over the real world.
- 31. Facts, details, or data.
- 33. A device that uses software, sensors, and communication technology to operate without human control.
- 34. The amount of work that someone accomplishes.
Down
- 1. The control of data for the use of people and organizations, including data collection, distribution, archiving, removal, and security.
- 2. The release of secure data into an unsecure environment.
- 5. A file installed on a customer's device or web browser to track personal preferences or browsing activity.
- 6. A private network set up for use within a business or organization.
- 8. Malware that blocks access to a system by sending a message that overloads the network.
- 9. Software installed on a computer or network without the owner's knowledge or consent.
- 13. Malware sent by email that looks legitimate to convince the recipient into submitting personal information.
- 14. A three-dimensional computer-generated environment.
- 15. Software that encrypts data on a computer system that cannot be unencrypted until the owner makes a financial payment.
- 18. The systems such as computers and telecommunications used for storing, retrieving and exchanging information.
- 21. Using Internet servers to store programs and data.
- 23. Hardware or software designed to block unauthorized access to a computer system or network.
- 24. A set of laws that protect the right to control the use of creative, literary, or artistic work.
- 25. A group or system of interconnected technology devices.
- 30. Technology that connects traditionally "dumb" devices to the Internet and each other.
- 32. A branch of artificial intelligence dedicated to enabling computers to understand human language.
