ISOM 240-Sec 02A: Crossword Puzzle Chapters 6 and 8

1234567891011121314151617181920
Across
  1. 4. (2 words) Using software- companies can mine comments in email / blogs/ social media to detect favorable and unfavorable opinions about specific subjects
  2. 5. (2 words) Activities for detecting and correcting data in the database that are incorrect/ incomplete/ improperly formatted or redundant
  3. 7. This is a (4 letter abbreviation) which used to mean that employees could use their own equipment to access the company’s network/ nowadays it has changed to mean that employees who use their own equipment will endanger the company
  4. 10. Most computer viruses deliver this and it can be benign or destructive
  5. 12. Information about a single city will reside in the ______ of the CITY Entity
  6. 16. A review of a specification or design document by a small group of people carefully selected based on the skills needed for the particular objectives being tested
  7. 18. (2 words) Organization’s rules for sharing/ disseminating/ acquiring/ standardizing/ classifying and inventorying information
  8. 19. (2 words) Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
  9. 20. This key is essentially a look-up field to find more data in another table
Down
  1. 1. When transactions entered are immediately processes by the computer the type of transaction processing is called ______
  2. 2. (2 words) Is a repository for raw and unstructured data or structured data that for the most part have not yet been analyzed / the data are in their native format
  3. 3. Policies/ procedures/ and technical measures used to prevent unauthorized access/ alteration/ theft/ or physical damage to information
  4. 6. Before signing up with a cloud provider users need to check the ______ (3 letter abbreviation) to see what kind of controls the cloud company is using
  5. 8. (3 letter abbreviation) for a technology that examines data files and sorts out low-priority online material while assigning higher priority to business-critical files
  6. 9. Group of bits
  7. 11. (2 words) Data files used to establish identity of users and electronic assets for protection of online transactions
  8. 13. In this type of data mining no groups have yet been defines and the tool can discover different groupings in the data
  9. 14. This type of web mining examines data related to links pointing out of the page indicate richness and variety of topics while links pointing to a document indicate popularity of the document
  10. 15. A type of distributed ledger that stores a permanent tamper-proof record of transactions and shares them among a distributed network of computers
  11. 17. Generalized category representing a person/ place or thing on which we store information