POB Chapter 2 Key Terms

12345678910111213141516171819202122
Across
  1. 4. Aided Design (CAD) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations.
  2. 6. Tunnel Chronic pain, numbness, or tingling in the hand. Can be caused by repetitive bending and extension of the wrist, as in keyboarding.
  3. 9. using a computer to gain unauthorized access to data in a system.
  4. 11. Intelligence computer systems able to perform tasks that normally require human intelligence.
  5. 13. buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, such as the Internet.
  6. 14. Network a set of computers connected together for the purpose of sharing resources.
  7. 17. collection of information that is organized so that it can easily be accessed, managed, and updated.
  8. 18. to run or operate (something, such as a factory or system) by using machines or computers, instead of people to do the work.
  9. 19. work from home through the use of the Internet, e-mail, and the telephone.
  10. 21. list of items such as property, goods in stock, or the contents of a building.
  11. 22. set of rules or a promise that limits access or places restrictions on certain types of information.
Down
  1. 1. machines capable of carrying out a complex or repetitious series of actions automatically.
  2. 2. System software systems that use databases of expert knowledge to offer advice or make decisions in such areas as medical diagnosis and trading on the stock exchange.
  3. 3. an electronic document in which data is arranged in the rows and columns of a grid and can be manipulated and used in calculations.
  4. 5. a local or restricted (private) communications network.
  5. 7. the unauthorized use or reproduction of another's work.
  6. 8. Collar Crime “Lying, Cheating, Stealing”- financially motivated nonviolent crime committed by business and government professionals.
  7. 10. The global communication network that allows almost all computers worldwide to connect and exchange information.
  8. 12. Virus a piece of code that typically has a detrimental effect to a computer, such as corrupting the system or destroying data.
  9. 15. obtaining (goods or a service) from an outside supplier.
  10. 16. an estimate of income and expenditure for a set period of time.
  11. 20. Information System (MIS) hardware and software systems within an business that provide the information that management needs to run the business.