Assignment 6 - Part 1 Activity

12345678910111213141516171819202122232425
Across
  1. 3. In ________ text, keywords are highlighted.
  2. 9. visits sites on the internet, discovering web pages and building an index to the web's content based on keywords
  3. 10. __________ files can be embedded in web pages and displayed by a browser.
  4. 13. A web ____ is composed of HTML tags and multimedia files.
  5. 14. The internet is a collection of ___.
  6. 15. ____________ is the software actually running on the servers that is delivering the website.
  7. 18. _____ processor looks up user-submitted key words on the index and reports back which web pages the crawler has found containing that word.
  8. 20. _______ management is the actual information that is available on a large website.
  9. 21. _____ should be underlined and color-coordinated in order to identifiable.
  10. 22. Hypertext Markup Language; the codes or tags that browsers use to create web pages
  11. 24. The ___ translates the hierarchal, human-readable names into the four-number IP address.
  12. 25. when a person falsifies data to pretend to be someone else
Down
  1. 1. Credibility is increased by _______ hypertext links.
  2. 2. ____________ communication - the sending and receiving occur at different times.
  3. 4. A web _______ is used to view web pages that may contain images, videos, and other multimedia and navigates between them via hyperlinks.
  4. 5. is the main technology for local area networks.
  5. 6. __________ are the different hardware. networks, and operating systems involved in maintaining large websites.
  6. 7. For photographs or illustrations, no more than ____ images from one artist or photographer is permissible for use on a website.
  7. 8. A ____ editor is a type of program used for editing plain text files.
  8. 11. A ___ is when computers are geographically close.
  9. 12. a piece of code this capable of copying itself, corrupting the system, and destroying data
  10. 16. ___________ communication - when both the sender and the receiver are active at the same time.
  11. 17. for music, lyrics, and music videos, up to ___ percent of the work but no more than thirty seconds of the music or lyrics from an individual musical work is permissible on a website.
  12. 19. a group of information on a computer that can be software programs or data
  13. 23. using a computer to gain unauthorized access to data in a system