Across
- 2. a computer program that is written to cause corruption of data.
- 6. an attempt to deceive an audience into believing that something false is real.
- 8. a combination of the words net and etiquette, refers to good mannersand proper behaviors when communicating through electronic media.
- 10. a technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye.
- 14. something intended to deceive; deliberate trickery inteded to gain an andvantage.
- 15. computer virus that makes many copies of itsef, resulting in the consumption of system resources that slows down or actually halts tasks.
- 17. a process that cna be used to cut down on or eliminate most junk mail.
Down
- 1. telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
- 3. astory which at one time could have been partially true, but has grown from constant retaelling into a mythical yarn.
- 4. computer virus triggered by the apperance or disappearance of specified data.
- 5. an illicit business model where profits are based on the investors' ability to recruit other individuals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered.
- 7. the practice of adding keywords to content to simplify searching.
- 9. computer virus that does something different from what it is expected to do.
- 11. a format originally developed to faciliate the syndication of news articles.
- 12. computer virus that does not cause its damage until a certain data or until the system has been booted a certain number of times.
- 13. unsolicited commerical e-mail that is sent to many people at hte same timeto promote products or services; also called junk mail.
- 16. types of personal information scams.
