1. The Internet connection option whose speed decreases the further away you are from a telephone switching station is _____. 2. Unsolicited e-mail is known as _____. 3. The network that would grow into the Internet was created in the late _____. 4. The most common protocol used by web browsers is _____. 5. Transferring a file from your computer to another computer is known as _____. 6. The ability of a Windows computer to work with a UNIX computer over the Internet is an example of _____. 7. The term _____ is the code for acceptable behavior on the Internet. 8. A(n) _____ is a program that can automatically spread itself from computer to computer. 9. The use of radio waves to track a chip placed in or on an object is called _____. 10. Altering accounts or database records to make it difficult to tell funds or equiptment has been stolen is called _____.