Lesson 27: Communications and Collaboration

12345678910111213
Across
  1. 1. Type of personal information scam used to retrieve sensitive information from people.
  2. 2. Format originally developed to facilitate the syndication of news articles.
  3. 4. Computer virus that make many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.
  4. 7. Computer virus that does not cause its damage until a certain date or until the system has been booted a number of times.
  5. 9. Telecommunications service in which parties in remote locations can participate via telephone in a group meeting.
  6. 11. Computer virus triggered by the appearance or disappearance of specific data.
  7. 12. Refers to good manners and proper behaviors when communicating through electronic media.
  8. 13. Something intended to deceive; deliberate trickery intended to gain an advantage
Down
  1. 1. Illicit business model where profits are based on the investor's ability to recruit other people to make payments.
  2. 3. Screening for data matching specified criteria; can be used to eliminate junk mail.
  3. 5. An attempt to deceive an audience into believing that something false is real.
  4. 6. The practice of adding keywords to content to simplify searching.
  5. 7. Computer virus that does something different from what it is expected to do.
  6. 8. Story which at one time could have been partially true, but has grown from constant retelling.
  7. 10. Computer program that is written to cause corruption of data