BIS3588 In-class Activity

12345678910111213141516
Across
  1. 2. Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
  2. 6. composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
  3. 9. phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
  4. 10. collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
  5. 11. the coding and scrambling of messages to prevent their being read or accessed without authorization.
  6. 12. a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
  7. 13. type of eavesdropping program that monitors information traveling over a network.
  8. 14. a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
  9. 15. the standard data manipulation language for relational database management systems.
  10. 16. Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
Down
  1. 1. _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
  2. 2. a string of bits, usually eight, used to store one number or character in a computer system.
  3. 3. form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
  4. 4. the process of changing from the old system to the new system.
  5. 5. the process of translating the system specifications prepared during the design stage into program code.
  6. 7. technology that aids in gathering information about a person or organization without their knowledge.
  7. 8. Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
  8. 10. independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
  9. 13. device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.