L26 crossword
Across
- 2. Types of personal information scams.
- 3. computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
- 6. A process that can be used to cut down on or eliminate most junk mail.
- 7. Computer virus triggered by the appearance or disappearance of specified data.
- 8. Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
- 12. computer virus that does something different from what it is expected to do.
- 15. something intended to deceive; deliberate trickery intended to gain an advantage.
- 16. a story which at one time could have been partially true, but has grown from constant retelling into a mythical yarn.
Down
- 1. Unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail.
- 2. An illicit business model where profits are based on investor's ability to recruit other individuals who are enrolled to make payment to their recruiters.
- 4. security measures that examine a fingerprint, a voice pattern, or the iris or retina of the eye.
- 5. computer virus that can make many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.
- 9. refers to good manners and proper behaviors when communicating through electronic media.
- 10. A format originally developed to facilitate the syndication of news articles.
- 11. a computer program that is written to cause corruption of data.
- 13. An attempt to deceive an audience into believing that something false is real.
- 14. The practice of adding keywords to content to simplify searching.