Across
- 4. A function that calculates the midpoint value of a range of data.
- 6. The trail of data left behind by individuals on the internet, including their online activities, interactions, and information.
- 7. The combination of the impact of a negative event with the likelihood of that event happening.
- 12. The use of deception to manipulate individuals into giving away sensitive information or making risky decisions.
- 13. Any program designed to compromise a computer's security.
- 15. A vertical group of cells in a worksheet identified by letters.
- 18. Something of value that needs protection from accidental damage and intentional harm.
- 20. A symbol that tells Google Sheets you are including all cells from the first referenced cell to the last referenced cell.
- 21. A document that may contain multiple worksheets.
- 24. A symbol that lets Google Sheets know you're going to do a calculation.
- 25. A function that calculates the mean of a range of data.
- 26. An individual or group seeking to breach or undermine systems and data security.
- 29. The act of using someone's personal information to access or open accounts in their name.
- 30. A flaw or weakness that may allow harm to an asset.
- 34. An attempt to damage, destroy, or gain access to a computer network or system.
- 35. The use of unique biological traits, such as fingerprints or facial recognition, to authenticate and grant access to systems or devices.
Down
- 1. The process of verifying the identity of a user, device, or system.
- 2. A single page of cells in Google Sheets.
- 3. Formatting that is applied to a cell based on specific criteria.
- 5. A symbol used to multiply cell values together.
- 8. The consequences of assets being compromised or destroyed.
- 9. Deceptive actions intended to result in financial or personal gain.
- 10. A computer application, device, or system that can cause damage.
- 11. A symbol used to subtract cell values from one another.
- 12. A function that allows a range of cell values to be added together.
- 14. An authentication method that requires users to provide two or more forms of identification or verification to access a system or account.
- 16. The probability of an event occurring.
- 17. A single box on a spreadsheet.
- 19. The act of falsifying data or identity information to mimic a legitimate source with the intent to deceive or gain unauthorized access.
- 22. Symbols used to enclose a range of cells in a function.
- 23. A function that identifies the largest value in a group.
- 27. The practice of protecting systems, networks, and programs from digital attacks.
- 28. A function that identifies the smallest value in a group.
- 31. A security process that requires users to provide two distinct methods to confirm their identity.
- 32. Emailing pretending to be from a known source to trick users into revealing their login credentials.
- 33. A group of multiple cells that run across a row or column.
- 36. A function that calculates the most common value in a range of data.
- 37. A horizontal group of cells in a worksheet identified by numbers.
