ISOM 240-Sec 02A: Crossword Puzzle Chapters 6 and 8
Across
- 4. (2 words) Using software- companies can mine comments in email / blogs/ social media to detect favorable and unfavorable opinions about specific subjects
- 5. (2 words) Activities for detecting and correcting data in the database that are incorrect/ incomplete/ improperly formatted or redundant
- 7. This is a (4 letter abbreviation) which used to mean that employees could use their own equipment to access the company’s network/ nowadays it has changed to mean that employees who use their own equipment will endanger the company
- 10. Most computer viruses deliver this and it can be benign or destructive
- 12. Information about a single city will reside in the ______ of the CITY Entity
- 16. A review of a specification or design document by a small group of people carefully selected based on the skills needed for the particular objectives being tested
- 18. (2 words) Organization’s rules for sharing/ disseminating/ acquiring/ standardizing/ classifying and inventorying information
- 19. (2 words) Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
- 20. This key is essentially a look-up field to find more data in another table
Down
- 1. When transactions entered are immediately processes by the computer the type of transaction processing is called ______
- 2. (2 words) Is a repository for raw and unstructured data or structured data that for the most part have not yet been analyzed / the data are in their native format
- 3. Policies/ procedures/ and technical measures used to prevent unauthorized access/ alteration/ theft/ or physical damage to information
- 6. Before signing up with a cloud provider users need to check the ______ (3 letter abbreviation) to see what kind of controls the cloud company is using
- 8. (3 letter abbreviation) for a technology that examines data files and sorts out low-priority online material while assigning higher priority to business-critical files
- 9. Group of bits
- 11. (2 words) Data files used to establish identity of users and electronic assets for protection of online transactions
- 13. In this type of data mining no groups have yet been defines and the tool can discover different groupings in the data
- 14. This type of web mining examines data related to links pointing out of the page indicate richness and variety of topics while links pointing to a document indicate popularity of the document
- 15. A type of distributed ledger that stores a permanent tamper-proof record of transactions and shares them among a distributed network of computers
- 17. Generalized category representing a person/ place or thing on which we store information