BIS3588

123456789101112131415161718
Across
  1. 4. a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another.
  2. 9. Web interface for presenting integrated personalized content from a variety of sources. Also refers to a Web site service that provides an initial point of entry to the Web.
  3. 10. the coding and scrambling of messages to prevent their being read or accessed without authorization.
  4. 11. collaborative Website where visitors can add, delete, or modify content, including the work of previous authors.
  5. 12. independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
  6. 14. technology that aids in gathering information about a person or organization without their knowledge.
  7. 16. phishing technique that redirects users to a bogus Web page, even when an individual enters the correct Web page address.
  8. 17. type of eavesdropping program that monitors information traveling over a network.
  9. 18. device to connect network components that has more intelligence than a hub and can filter and forward data to a specified destination.
Down
  1. 1. a string of bits, usually eight, used to store one number or character in a computer system.
  2. 2. Web ________ refers to discovery and analysis of useful patterns and information from the World Wide Web.
  3. 3. the process of translating the system specifications prepared during the design stage into program code.
  4. 5. the process of changing from the old system to the new system.
  5. 6. Web _______ is an easy-to-use software tool for accessing the World Wide Web and the Internet.
  6. 7. a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
  7. 8. _________ decisions refer to the decisions that are repetitive, routine, and have a definite procedure for handling them.
  8. 13. form of abuse in which thousands and even hundreds of thousands of unsolicited e-mail and electronic messages are sent out, creating a nuisance for both businesses and individual users.
  9. 15. composite software applications that depend on high-speed networks, universal communication standards, and open-source code.
  10. 17. the standard data manipulation language for relational database management systems.