lesson 26
Across
- 4. personal information scams
- 7. a computer virus that does something different form what it is expected to do
- 9. electronic transfer of data
- 11. illicit business model where profits are based on the investors ability to recruit other individuals who are enrolled to make payments to their recruiters
- 12. computer virus triggered by the appearance or disappearance of special data
- 13. a process that can be used to cut down on or eliminate most junk mail
- 15. formats originally developed to facilitate the syndication of news articles
- 16. a combination of the words net and etiquette, refers to good manners and proper behavior when communicating through electronic media
- 17. unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail
Down
- 1. computer program that is written to cause corruption of data
- 2. high level security system
- 3. computer virus that does not cause any damage until a certain time or date or until the system has been booted a certain number of times
- 5. used in blogs and other informational sites to simplify the search process
- 6. an attempt to deceive an audience into believing that something false is real
- 8. a story which at one time could have been partially true
- 10. computer virus that makes copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks
- 14. something intended to deceive; deliberate trickery intended to gain an advantage