Lesson Twenty-Six Vocabulary Words

1234567891011121314151617
Across
  1. 2. A computer crime that involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, information, or other things in value, or to cause loss.
  2. 4. An attempt to deceive an audience into believing that something false is real.
  3. 6. Personal information scams.
  4. 8. Examines a fingerprint, a voice pattern, or the iris or retina of the eye for security purposes.
  5. 13. A combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media.
  6. 14. Illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
  7. 15. Stories which at one time could have been partially true, but have grown from constant retelling into a mythical yarn.
  8. 17. Helps decrease the amount of spam received by most users.
Down
  1. 1. A virus that does something different from what it is expected to do.
  2. 3. A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
  3. 5. Formats originally developed to facilitate the syndication of news articles.
  4. 7. This uses a telecommunications system to serve groups, permitting the live exchange and sharing of information between two or more people.
  5. 9. Used in blogs and other informational sites to simplify the search process.
  6. 10. Unsolicited advertisements, flyers, and catalogs in your regular mail - also known as junk mail.
  7. 11. A program that has been written, usually by a hacker, to cause corruption of data on a computer.
  8. 12. Makes many copies of itself, resulting in the consumption of the system resources that slows down or actually halts tasks.
  9. 16. A virus triggered by the appearance or disappearance of specified data.