Assignment 6 - Part 1 Activity

123456789101112131415161718192021222324
Across
  1. 2. a piece of code that is capable of copying itself, corrupting the system, and destroying data
  2. 5. Hypertext Markup Language; the codes or tags that browsers use to create web pages
  3. 6. a group of information on a computer that can be software programs or data
  4. 8. _____ processor looks up user-submitted key words on the index and reports back which web pages the crawler has found containing that word.
  5. 9. In ________ text, keywords are highlighted.
  6. 11. ____________ is the software actually running on the servers that is delivering the website.
  7. 12. For photographs or illustrations, no more than ____ images from one artist or photographer is permissible for use on a website.
  8. 14. ___________ communication - when both the sender and the receiver are active at the same time.
  9. 17. using a computer to gain unauthorized access to data in a system
  10. 20. Credibility is increased by _______ hypertext links.
  11. 21. A web ____ is composed of HTML tags and multimedia files.
  12. 23. _______ management is the actual information that is available on a large website.
  13. 24. A ____ editor is a type of program used for editing plain text files.
Down
  1. 1. __________ files can be embedded in web pages and displayed by a browser.
  2. 3. A web _______ is used to view web pages that may contain images, videos, and other multimedia and navigates between them via hyperlinks.
  3. 4. __________ are the different hardware. networks, and operating systems involved in maintaining large websites.
  4. 7. ____________ communication - the sending and receiving occur at different times.
  5. 10. when a person falsifies data to pretend to be someone else
  6. 13. A ___ is when computers are geographically close.
  7. 15. visits sites on the internet, discovering web pages and building an index to the web's content based on keywords
  8. 16. The internet is a collection of ___.
  9. 18. is the main technology for local area networks.
  10. 19. The ___ translates the hierarchal, human-readable names into the four-number IP address.
  11. 22. _____ should be underlined and color-coordinated in order to identifiable.
  12. 24. for music, lyrics, and music videos, up to ___ percent of the work but no more than thirty seconds of the music or lyrics from an individual musical work is permissible on a website.