lesson 26

1234567891011121314151617
Across
  1. 4. personal information scams
  2. 7. a computer virus that does something different form what it is expected to do
  3. 9. electronic transfer of data
  4. 11. illicit business model where profits are based on the investors ability to recruit other individuals who are enrolled to make payments to their recruiters
  5. 12. computer virus triggered by the appearance or disappearance of special data
  6. 13. a process that can be used to cut down on or eliminate most junk mail
  7. 15. formats originally developed to facilitate the syndication of news articles
  8. 16. a combination of the words net and etiquette, refers to good manners and proper behavior when communicating through electronic media
  9. 17. unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail
Down
  1. 1. computer program that is written to cause corruption of data
  2. 2. high level security system
  3. 3. computer virus that does not cause any damage until a certain time or date or until the system has been booted a certain number of times
  4. 5. used in blogs and other informational sites to simplify the search process
  5. 6. an attempt to deceive an audience into believing that something false is real
  6. 8. a story which at one time could have been partially true
  7. 10. computer virus that makes copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks
  8. 14. something intended to deceive; deliberate trickery intended to gain an advantage