Across
- 3. Virus triggered by the appearance or disappearance of specified data.
- 6. Process that can be used to cut down on or eliminate most junk mail.
- 8. Used in blogs and other informational sites to simplify the search process.
- 10. A virus that does something different from what it is expected to do.
- 12. Virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts a task.
- 13. A telecommunications system that permits the live exchange and sharing of information between two or more people.
- 14. Format originally developed to facilitate the syndication of news articles and now widely used to share the contents of blogs.
- 15. Illicit business model where profits are based on the investor's ability to recruit other individuals who are enrolled to make payments to their recruiters.
- 17. Stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn.
Down
- 1. A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
- 2. Using e-mail messages for personal information scams.
- 4. A high-level method of security that matches a fingerprint, voice pattern, or the iris or retina of the eye to the entry originally stored in the system.
- 5. A program that has been written, usually by a hacker, to cause corruption of data on a computer.
- 7. Refers to the good manners and proper behaviors when communicating through electronic media.
- 9. An attempt to deceive an audience into believing something false is real.
- 11. Junk e-mail.
- 16. Dishonestly obtaining money, property, information, or other things of value, or to cause loss.
