ITM 310 Study

123456789101112131415
Across
  1. 2. Hardware and software filter between a private network and the Internet
  2. 3. Unsolicited e-mail sent for advertising purposes
  3. 4. A decentralized and distributed network used to record transactions
  4. 6. Software that secretly gathers information about users while they browse the Web
  5. 7. A 2D or 3D graphical representation of a person in the virtual world
  6. 9. Spyware that collects user information for targeted ads
  7. 10. A smaller version of a data warehouse used by a single department
  8. 12. Allows customers to modify the standard offering of a product
  9. 14. Small text files with unique ID tags embedded in a Web browser
  10. 15. Self-propagating program code triggered by a specified time or event Worm Travels from computer to computer in a network but doesn't usually erase data
Down
  1. 1. Fake videos or audio recordings that look and sound real
  2. 5. Registering a domain name to profit from someone else’s trademark
  3. 8. A collection of all relevant data organized in integrated files Information Facts that have been analyzed by the process component
  4. 11. AI application performing simple, repetitive tasks
  5. 13. Fraudulent e-mails that seem to come from legitimate sources