Lesson 26 Vocabulary
Across
- 2. types of personal information scams
- 3. a story that was partially true, but has grown into a myth
- 4. adding keywords to content to simplify searching
- 5. unsolicited commercial e-mail that is sent to many people at the same time to promote something
- 9. parties in remote locations can participate via telephone in a group meeting
- 11. process that can cut down on or eliminate junk mail
- 12. profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters
- 13. intended to deceive to gain an advantage
- 14. attempt to trick to audience into believing something false is real
- 16. virus that does not cause damage until until a certain date or number of boots
Down
- 1. a technique or device that examines a fingerprint, voice pattern, or the iris/retina of the eye
- 6. virus that makes copies of itself to consume system resources and slow down tasks
- 7. manners and proper behavior when communicating electronically
- 8. format originally developed to facilitate the syndication of news articles
- 10. virus triggered by appearance or disappearance of specified data
- 15. computer program that is written to cause corruption of data