Introduction to Informational Technology

12345678910111213141516171819202122232425262728293031323334
Across
  1. 3. Software designed to monitor data and allow unauthorized remote access to a computer system.
  2. 4. An evolving form of decentralized data processing.
  3. 7. Translate text into code that appears to be random and meaningless.
  4. 10. A legal agreement that controls the use and distribution of software.
  5. 11. Software that records information about your browsing history to display targeted advertising.
  6. 12. To save a copy of files in a separate location.
  7. 16. A computer that manages access to network resources.
  8. 17. Match two or more versions of the same information.
  9. 19. A device's ability to analyzed data and learn new skills from this data.
  10. 20. Facts, statistics, and other bits of information.
  11. 22. The ability to accomplish something without wasting time or effort.
  12. 26. The use of unlicensed proprietary software.
  13. 27. The machines, wiring, and other physical components of a computer network.
  14. 28. The programs and other operating information used by a computer.
  15. 29. Layering computer-generated content over the real world.
  16. 31. Facts, details, or data.
  17. 33. A device that uses software, sensors, and communication technology to operate without human control.
  18. 34. The amount of work that someone accomplishes.
Down
  1. 1. The control of data for the use of people and organizations, including data collection, distribution, archiving, removal, and security.
  2. 2. The release of secure data into an unsecure environment.
  3. 5. A file installed on a customer's device or web browser to track personal preferences or browsing activity.
  4. 6. A private network set up for use within a business or organization.
  5. 8. Malware that blocks access to a system by sending a message that overloads the network.
  6. 9. Software installed on a computer or network without the owner's knowledge or consent.
  7. 13. Malware sent by email that looks legitimate to convince the recipient into submitting personal information.
  8. 14. A three-dimensional computer-generated environment.
  9. 15. Software that encrypts data on a computer system that cannot be unencrypted until the owner makes a financial payment.
  10. 18. The systems such as computers and telecommunications used for storing, retrieving and exchanging information.
  11. 21. Using Internet servers to store programs and data.
  12. 23. Hardware or software designed to block unauthorized access to a computer system or network.
  13. 24. A set of laws that protect the right to control the use of creative, literary, or artistic work.
  14. 25. A group or system of interconnected technology devices.
  15. 30. Technology that connects traditionally "dumb" devices to the Internet and each other.
  16. 32. A branch of artificial intelligence dedicated to enabling computers to understand human language.