Lesson 26

12345678910111213141516
Across
  1. 2. used in blogs to simplify the search process
  2. 3. attempt to deceive an audience into believing that something false is real
  3. 7. personal information scams
  4. 8. formats originally developed to facilitate the syndication of news articles
  5. 10. security that examines fingerprint, voice pattern, or eye
  6. 14. process used to cut down junk mail
  7. 16. refers to good manners and proper behaviors when communicating through electronic media
Down
  1. 1. illicit business model where profits are based on the investors ability to recruit people
  2. 2. using telecommunications to live exchange and sharing of information between 2 or more people
  3. 4. manipulation of a computer or computer data in order to dishonestly obtain money
  4. 5. junk email
  5. 6. virus that doesn't cause damage until a certain date or time
  6. 9. program used to cause corruption of data on a computer
  7. 11. virus that does something different from what it is expected to do
  8. 12. stories which have grown from constant retelling into a mythical yarn
  9. 13. makes copies of itself to slow down the computer
  10. 15. virus triggered by the appearance or disappearance of data