BIS3588 In-class Activity
Across
- 2. Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
- 6. composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
- 9. phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
- 10. collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
- 11. the coding and scrambling of messages to prevent their being read or accessed without authorization.
- 12. a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
- 13. type of eavesdropping program that monitors information traveling over a network.
- 14. a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
- 15. the standard data manipulation language for relational database management systems.
- 16. Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
Down
- 1. _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
- 2. a string of bits, usually eight, used to store one number or character in a computer system.
- 3. form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
- 4. the process of changing from the old system to the new system.
- 5. the process of translating the system specifications prepared during the design stage into program code.
- 7. technology that aids in gathering information about a person or organization without their knowledge.
- 8. Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
- 10. independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
- 13. device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.