Lesson 27: Communications and Collaboration

12345678910111213141516
Across
  1. 5. To screen for data matching specified criteria; eliminates junk mail.
  2. 8. Practice of adding keywords to content to simplify searching.
  3. 9. Something intended to deceive
  4. 10. Type of personal information scam.
  5. 13. Computer virus that does not cause damage until a certain date or until the system has been booted a number of times.
  6. 14. Format originally developed to facilitate the syndication of news articles.
  7. 15. Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
  8. 16. Story in which at one time could have been partially true, but has grown from retelling.
Down
  1. 1. Computer virus that makes many copies of itself, resulting in the consumption of system resources.
  2. 2. Illicit business model where profits are based on the investor's ability to recruit other people.
  3. 3. Computer virus triggered by the appearance or disappearance of specified data.
  4. 4. Computer program that is written to cause corruption of data.
  5. 6. Refers to good manners and proper behaviors when communicating through electronic media.
  6. 7. Computer virus that does something different from what it is expected to do.
  7. 11. An attempt to deceive an audience into believing that something false is real.
  8. 12. Unsolicited commercial e-mail that is sent to many people at the same time; junk mail.