Across
- 3. Format originally developed to facilitate the syndication of news articles and now widely used to share the contents of blogs
- 7. A high-level method of security that matches a fingerprint, voice pattern, or the iris or retina of the eye to the entry originally stored in the system.
- 11. Dishonestly obtaining money, property, information, or other things of value, or to cause loss.
- 12. virus triggered by the appearance or disappearance of specified data
- 13. An attempt to deceive an audience into believing something false is real
- 14. used in blogs or other information sites to simplify the process
- 15. A program that has been written, usually by a hacker, to cause corruption of data on a computer.
- 16. An attempt to deceive an audience into believing something false is real
Down
- 1. junk e-mail
- 2. a virus that does something different than expected
- 4. process that can be used to cut down on or eliminate most junk mail
- 5. using e-mail for personal information scams
- 6. business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
- 8. telecommunications system that permits the live exchange and sharing of information between two or more people
- 9. Stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn
- 10. Virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts a task.
- 17. bomb A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
