BIS3588 Class Exercise

123456789101112131415161718
Across
  1. 3. a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
  2. 6. a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
  3. 7. the standard data manipulation language for relational database management systems.
  4. 8. technology that aids in gathering information about a person or organization without their knowledge.
  5. 10. the removal of organizations or business process layers responsible for certain intermediary steps in a value chain.
  6. 12. Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
  7. 13. the process of changing from the old system to the new system.
  8. 14. composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
  9. 15. form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
  10. 17. type of eavesdropping program that monitors information traveling over a network.
  11. 18. phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
Down
  1. 1. a string of bits, usually eight, used to store one number or character in a computer system.
  2. 2. Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
  3. 4. the coding and scrambling of messages to prevent their being read or accessed without authorization.
  4. 5. independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
  5. 8. _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
  6. 9. the process of translating the system specifications prepared during the design stage into program code.
  7. 11. collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
  8. 16. Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
  9. 17. device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.