lesson 26 vocab.

1234567891011121314151617
Across
  1. 2. a computer program that is written to cause corruption of data.
  2. 6. an attempt to deceive an audience into believing that something false is real.
  3. 8. a combination of the words net and etiquette, refers to good mannersand proper behaviors when communicating through electronic media.
  4. 10. a technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye.
  5. 14. something intended to deceive; deliberate trickery inteded to gain an andvantage.
  6. 15. computer virus that makes many copies of itsef, resulting in the consumption of system resources that slows down or actually halts tasks.
  7. 17. a process that cna be used to cut down on or eliminate most junk mail.
Down
  1. 1. telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
  2. 3. astory which at one time could have been partially true, but has grown from constant retaelling into a mythical yarn.
  3. 4. computer virus triggered by the apperance or disappearance of specified data.
  4. 5. an illicit business model where profits are based on the investors' ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered.
  5. 7. the practice of adding keywords to content to simplify searching.
  6. 9. computer virus that does something different from what it is expected to do.
  7. 11. a format originally developed to faciliate the syndication of news articles.
  8. 12. computer virus that does not cause its damage until a certain data or until the system has been booted a certain number of times.
  9. 13. unsolicited commerical e-mail that is sent to many people at hte same timeto promote products or services; also called junk mail.
  10. 16. types of personal information scams.