Across
- 2. Hardware and software filter between a private network and the Internet
- 3. Unsolicited e-mail sent for advertising purposes
- 4. A decentralized and distributed network used to record transactions
- 6. Software that secretly gathers information about users while they browse the Web
- 7. A 2D or 3D graphical representation of a person in the virtual world
- 9. Spyware that collects user information for targeted ads
- 10. A smaller version of a data warehouse used by a single department
- 12. Allows customers to modify the standard offering of a product
- 14. Small text files with unique ID tags embedded in a Web browser
- 15. Self-propagating program code triggered by a specified time or event Worm Travels from computer to computer in a network but doesn't usually erase data
Down
- 1. Fake videos or audio recordings that look and sound real
- 5. Registering a domain name to profit from someone else’s trademark
- 8. A collection of all relevant data organized in integrated files Information Facts that have been analyzed by the process component
- 11. AI application performing simple, repetitive tasks
- 13. Fraudulent e-mails that seem to come from legitimate sources
