lesson 26 Vocab

1234567891011121314151617
Across
  1. 3. telecommunications service in which parties in remote locations can praticipate via telephone in a group meeting
  2. 5. a process that can be used to cut down on or eliminate most junk mail
  3. 6. types of personal information scams
  4. 7. a story which at one time could have been partially true, but has grown from constant retelling into a mythical yarn
  5. 9. the practice of adding keywords to content to simplify searching
  6. 10. computer virus that does something different from what it is expected to do
  7. 12. junk e-mail
  8. 13. a format originally developed to facilitate th esyndication of news articles
  9. 15. an illicit buisness model where profits are based on th investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered
  10. 16. an attempt to decive an audience into believing that something false is real
  11. 17. computer virus that does not cause its damage until date or until the system has booted a certain number of times
Down
  1. 1. a technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye
  2. 2. computer virus that makes many copies of itself resulting in the consumption of system resources that slows down or actually halts tasks.
  3. 4. a combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media
  4. 8. a computer program that is written to cause corruption of data
  5. 11. something intended to deceive; deliberate trickery intended to gain advantage
  6. 14. computer virus triggered by the appearance or disappearance of specified data