Across
- 3. A form of high-speed Internet access.
- 4. A type of malware specifically used to do harm or mischief to programs, data, and/or hardware and include Logic Bombs, Worms and Trojans Horses.
- 6. Named because of the top letter of the keyboard.
- 8. A discrepancy in access to technology resources among socioeconomic groups. (2 words)
- 12. Emails that falsely claim to be legitimate business in order to gain private information to be used for identity theft.
- 13. When you go into a tunnel, your phone will get no ____.
- 14. A traditional telephone connection in your house.
- 17. A secret word to log in to a system.
- 21. This term refers to the next wave of artificial intelligence systems that can generate content, make decisions, and perform tasks without specific programming for each task.
- 22. A software that allows students to produce an outline as a visual map. (2 words)
- 23. A book in electronic form that can be read on a computer or handheld device rather than in print.
- 26. A field of AI that trains computers to capture and interpret information from image and video data. (2 words)
- 31. Online harassment in social network.
- 33. Organizations that adopt ______________ aim to streamline processes across their business using artificial intelligence (AI), robotic process automation (RPA), and other technologies to run without human intervention.
- 35. Move up or down a computer screen.
- 36. A small portable computer. Larger than a phone, smaller than a laptop.
- 37. Someone who loves technology (informal).
- 38. The study and construction of algorithms that can learn from and make predictions or decisions based on data. (2 words)
Down
- 1. Watching films and television online without downloading.
- 2. __________ is a platform-as-a-service, that allows for the operation of enterprise and technical management support systems, such as IT service management and help desk functionality.
- 5. A branch of artificial intelligence (AI) that enables computers to comprehend, generate, and manipulate human language. (3 words)
- 7. Like a keyboard, but on a mobile device.
- 9. When the telephone line is busy it is ____.
- 10. A collection of web pages located in an online community that encourages collaboration and communication of ideas by having users contribute or modify content.
- 11. Empowered business users who create new or change existing business applications without the need to involve IT departments. (2 words)
- 15. A small symbol on a computer screen.
- 16. An 'intelligent' mobile device.
- 17. You put this small device into the wall to get electricity.
- 18. Short form of 'satellite navigation'.
- 19. Electronic monitoring system that can track the location of the chip's wearer.
- 20. A system of connecting internet sites through hypertext links. (3 words)
- 24. RPA tool used by SimplifyNext, associated with 'double silver' achievement.
- 25. The role of _____ is to scale automation within the organization by providing ongoing automation assessment and implementation. (abbreviation)
- 27. When people use online systems to access the personal data of students in order to accomplish identity theft.
- 28. Skills in using the information that technological devices carry. (2 words) SPYWARE A malware that secretly gathers information stored on a person's computer. FIREWALLS Software used to block unauthorized access to computer.
- 29. In how many countries does SimplifyNext operate at?
- 30. A video version of blog where posts are video clips instead of text entries.
- 32. A public web page used for discussing a topic or issue.
- 34. A new version of an existing program or app.
