IC3 Lesson 26 Vocab

12345678910111213141516
Across
  1. 2. A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
  2. 4. A telecommunications system that permits the live exchange and sharing of information between two or more people.
  3. 8. Format originally developed to facilitate the syndication of news articles and now widely used to share the contents of blogs.
  4. 10. Using e-mail messages for personal information scams.
  5. 13. Illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
  6. 15. Virus triggered by the appearance or disappearance of specified data.
  7. 16. Virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts a task.
Down
  1. 1. A high-level method of security that matches a fingerprint, voice pattern, or the iris or retina of the eye to the entry originally stored in the system.
  2. 3. Stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn.
  3. 4. Used in blogs and other informational sites to simplify the search process.
  4. 5. A program that has been written, usually by a hacker, to cause corruption of data on a computer.
  5. 6. Dishonestly obtaining money, property, information, or other things of value, or to cause loss.
  6. 7. A virus that does something different from what it is expected to do.
  7. 9. Refers to the good manners and proper behaviors when communicating through electronic media.
  8. 11. An attempt to deceive an audience into believing something false is real.
  9. 12. Process that can be used to cut down on or eliminate most junk mail.
  10. 14. Junk e-mail.