L26 crossword

12345678910111213141516
Across
  1. 2. Types of personal information scams.
  2. 3. computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
  3. 6. A process that can be used to cut down on or eliminate most junk mail.
  4. 7. Computer virus triggered by the appearance or disappearance of specified data.
  5. 8. Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
  6. 12. computer virus that does something different from what it is expected to do.
  7. 15. something intended to deceive; deliberate trickery intended to gain an advantage.
  8. 16. a story which at one time could have been partially true, but has grown from constant retelling into a mythical yarn.
Down
  1. 1. Unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail.
  2. 2. An illicit business model where profits are based on investor's ability to recruit other individuals who are enrolled to make payment to their recruiters.
  3. 4. security measures that examine a fingerprint, a voice pattern, or the iris or retina of the eye.
  4. 5. computer virus that can make many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.
  5. 9. refers to good manners and proper behaviors when communicating through electronic media.
  6. 10. A format originally developed to facilitate the syndication of news articles.
  7. 11. a computer program that is written to cause corruption of data.
  8. 13. An attempt to deceive an audience into believing that something false is real.
  9. 14. The practice of adding keywords to content to simplify searching.