Across
- 3. telecommunications service in which parties in remote locations can praticipate via telephone in a group meeting
- 5. a process that can be used to cut down on or eliminate most junk mail
- 6. types of personal information scams
- 7. a story which at one time could have been partially true, but has grown from constant retelling into a mythical yarn
- 9. the practice of adding keywords to content to simplify searching
- 10. computer virus that does something different from what it is expected to do
- 12. junk e-mail
- 13. a format originally developed to facilitate th esyndication of news articles
- 15. an illicit buisness model where profits are based on th investor's ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered
- 16. an attempt to decive an audience into believing that something false is real
- 17. computer virus that does not cause its damage until date or until the system has booted a certain number of times
Down
- 1. a technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye
- 2. computer virus that makes many copies of itself resulting in the consumption of system resources that slows down or actually halts tasks.
- 4. a combination of the words net and etiquette, refers to good manners and proper behaviors when communicating through electronic media
- 8. a computer program that is written to cause corruption of data
- 11. something intended to deceive; deliberate trickery intended to gain advantage
- 14. computer virus triggered by the appearance or disappearance of specified data
