TECHNOLOGY

12345678910111213141516171819202122232425
Across
  1. 4. A small electronic circuit, also called an integrated circuit (IC), that is used in computers, smartphones, and other digital devices.
  2. 5. The visible layer of the internet that makes up under 5% of the entire internet, this is what the public has access to everyday, 24/7, containing all information indexed by search engines that anyone can access on a traditional we browser (Chrome, MS Edge, Firefox, Yahoo, etc.)
  3. 6. A portion of the internet that isn't indexed by standard search engines and are often composed of dynamic content, password-protected sites,
  4. 9. Wearable tech that tracks health and notifications.
  5. 10. A device used to magnify tiny objects that cannot be seen with the naked eye
  6. 14. Refers to the use of technology to perform tasks with minimal human intervention.
  7. 17. Captures sound and makes voices louder.
  8. 19. Headphones with a mic, used for listening and speaking.
  9. 22. A machine programmed to perform tasks automatically.
  10. 24. Used for communication, GPS, and weather monitoring
  11. 25. The process of finding and fixing bugs in software.
Down
  1. 1. The physical components of a computer system
  2. 2. Used for photography, delivery, and surveillance.
  3. 3. It is used in maps, navigation apps, and tracking devices.
  4. 7. Produces paper copies of digital documents.
  5. 8. Refers to the state of concealment a person has on the internet.
  6. 11. Refers to the process of introducing new ideas, methods, or technologies to improve or transform systems, products, or services.
  7. 12. A device used to capture images or videos.
  8. 13. A technology that uses unique physical or behavioral characteristics (such as fingerprints, facial recognition, or voice patterns) to identify individuals.
  9. 15. Shows images or videos on a big screen.
  10. 16. A technology that emits a focused beam of light with high energy
  11. 18. A small, touch-screen computer for learning and activities.
  12. 20. Refers to the process of converting information into a secure format to prevent unauthorized access.
  13. 21. Measures and practices designed to protect computer systems, networks, and data from unauthorized access or attacks.
  14. 23. A telecommunication medium used for transmitting and receiving moving images and sound