made by NaHaven

123456789101112131415161718192021222324
Across
  1. 3. Employee who uses analytics and other Big Data tools to compile statistics on data that an organization can use to plan product development or create strategies for marketing.
  2. 4. Cache that helps speed the processes of a computer by storing frequently used instructions and data.
  3. 8. The time it takes a signal to travel from one location to another on a network
  4. 9. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
  5. 10. The electronic component of a computer that interprets and carries out the basic instructions that operate a computer
  6. 12. Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
  7. 14. Practices that involve reducing the electricity and environmental waste while using a computers, mobile devices, and related technologies.
  8. 15. Radio frequency identification; technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person
  9. 17. Disk Defragmenter - A tool that reorganizes the file and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs and app run faster
  10. 18. A magnetically coated ribbon of plastic that is capable of storing large amounts of data and information at a low cost
  11. 20. Group of files waiting in the buffer to be printed
  12. 23. Employee who develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes
  13. 24. A request for specific data from a database.
Down
  1. 1. The number of horizontal and vertical pixels in a display device
  2. 2. An electrical disturbance that can degrade communications
  3. 5. A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network --- if they are not paid a sum of money
  4. 6. A website or web app, sometimes called a curation website, that allows users to collect and compile content from a variety of websites about a particular topic or theme
  5. 7. The trend of computers and devices with technologies that overlap, which can result in consumers needing fewer devices for the functionality that they require
  6. 11. Display technology that sandwiches a liquid compound between two sheets of material that presents sharp, flicker-free images on a screen when illuminated
  7. 13. Technology-related health condition that affects eyesight. See also CVS
  8. 16. A collection of data organized in a manner that allows access, retrieval, and use of that data.
  9. 19. is a number system that has just two unique digits, 0 and 1, called bits. A bit (short for binary digit) is the smallest unit of data the computer can process. By itself, a bit is not very informative
  10. 21. A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices
  11. 22. A small text file that a web server stores on your computer. Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences.