BIS3588

1234567891011121314151617
Across
  1. 2. the standard data manipulation language for relational database management systems.
  2. 3. independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
  3. 5. a string of bits, usually eight, used to store one number or character in a computer system.
  4. 7. type of eavesdropping program that monitors information traveling over a network.
  5. 8. composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
  6. 11. the process of translating the system specifications prepared during the design stage into program code.
  7. 14. Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
  8. 15. the process of changing from the old system to the new system.
  9. 16. a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
  10. 17. a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
Down
  1. 1. Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
  2. 2. device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
  3. 4. Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
  4. 6. phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
  5. 7. form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
  6. 9. _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
  7. 10. the coding and scrambling of messages to prevent their being read or accessed without authorization.
  8. 12. technology that aids in gathering information about a person or organization without their knowledge.
  9. 13. collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.