Xplore 2.0
Across
- 3. Malicious software that replicates itself and infects a computer.
- 6. Data organized in rows and columns.
- 7. Scam that attempts to steal your passwords via email.
- 10. A precise, step-by-step set of rules for solving a problem.
- 12. The process of creating the look and feel of an interface.
- 15. The unique address of a website (e.g., google.com).
- 18. A characteristic or factor that can be measured or changed.
- 19. A blanket term for all types of malicious software.
- 20. Convert data into a secret code to prevent unauthorized access.
- 21. A type of graphic advertisement displayed on a website.
- 23. A static, high-fidelity visual design representation.
- 25. The specific audience a campaign is trying to reach.
- 28. The person who interacts with the software or website.
- 29. Person who gains unauthorized access to data or systems.
Down
- 1. Optimizing content to rank higher in search results. (Abbreviation)
- 2. An interaction counted on a pay-per-___ advertisement.
- 4. The valuable conclusion derived from analyzing data.
- 5. A single piece of information from a dataset.
- 8. A single instance of an ad being displayed on a screen.
- 9. An AI or statistical structure trained to predict an outcome.
- 10. Set of rules enabling different applications to talk to each other. (Abbreviation)
- 11. Instructions written for a computer.
- 13. A request for information from a database.
- 14. The standard markup language for web pages. (Abbreviation)
- 16. A network security system that blocks unauthorized traffic.
- 17. Popular scripting language used to make web pages interactive.
- 22. A clickable element on a screen that triggers an action.
- 24. A computer or system that manages network resources.
- 26. A general direction in which data is moving; a popular shift.
- 27. Language used to describe the presentation of a web page. (Abbreviation)