Lesson 26 Vocabulary

12345678910111213141516
Across
  1. 1. The practice of adding keywords to content to simplify searching.
  2. 2. A story which at one time could have been true, but has grown from constant retelling into a mythical yarn/.
  3. 3. A computer virus that does something different from what it is expected to do.
  4. 9. A technique that examines the eye, fingerprints and voice patterns
  5. 12. Computer virus that makes a copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.
  6. 13. Types of personal information scams.
  7. 14. A format originally developed to facilitate the syndication of news articles.
  8. 16. A computer program that is written to cause corruption of data.
Down
  1. 1. Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
  2. 4. A process that can be used to cut down on or eliminate most junk mail.
  3. 5. A combination of the words net and etiquette.
  4. 6. Unsolicited commercial e-mail that is sent to many people.
  5. 7. Computer virus triggered by the appearance or disappearance of specified data.
  6. 8. An illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
  7. 10. Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
  8. 11. An attempt to deceive an audience into believing that something false is real.
  9. 15. Something intended to deceive; deliberate trickery intended to gain an advantage.