Across
- 1. The practice of adding keywords to content to simplify searching.
- 2. A story which at one time could have been true, but has grown from constant retelling into a mythical yarn/.
- 3. A computer virus that does something different from what it is expected to do.
- 9. A technique that examines the eye, fingerprints and voice patterns
- 12. Computer virus that makes a copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.
- 13. Types of personal information scams.
- 14. A format originally developed to facilitate the syndication of news articles.
- 16. A computer program that is written to cause corruption of data.
Down
- 1. Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
- 4. A process that can be used to cut down on or eliminate most junk mail.
- 5. A combination of the words net and etiquette.
- 6. Unsolicited commercial e-mail that is sent to many people.
- 7. Computer virus triggered by the appearance or disappearance of specified data.
- 8. An illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
- 10. Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
- 11. An attempt to deceive an audience into believing that something false is real.
- 15. Something intended to deceive; deliberate trickery intended to gain an advantage.
