computing

12345678
Across
  1. 1. obtaining something from external source
  2. 3. redirecting users from legit website to a scam site
  3. 4. 2 words, payment for service when customer uses potentially unlimited resource
  4. 6. is used for local area networks,consists of cables and modems
  5. 8. manipulating person into divulging private info
Down
  1. 2. consolidate information in one place
  2. 3. when a file contains images and textx ready to be printed
  3. 5. using communication systems to deceive people into sharing personal info
  4. 6. data model flexibility with underlying structure
  5. 7. device that registers keystrokes