Web Ethics & Security
Across
- 11. The rights given to a person that created something of their own on their own.
- 15. An individual who uses the internet to locate people, typically children to commit child sexual abuse.
- 16. A type of program that uses a certain code which then is used to change the way that a computer operates.
- 19. Stealing software that is legally protected. For example, copyright, modifying, and distributing.
- 20. a scheme used to damage another individual by using email.
Down
- 1. Using someone else's identity to gain benefits in their name.
- 2. A type of program that copies itself that way it is able to spread onto other computers.
- 3. The use of technology to bully someone over the internet. It is usually a mean message, or a threat.
- 4. Creation, distribution, or forwarding of a message which contains sexually explicit materials through an electronic device.
- 5. Number of internet connected devices, each of these are running one or possibly more bots.
- 6. The act of a computer virus attaching itself to a virus
- 7. The malicious activity a computer virus or worm is designed to do
- 8. When A certain amount used permitted by Copyright.
- 9. A device that provides security/safeguard from unauthorized people.
- 10. this is a type of software that is usually used to damage other computers.
- 12. A type of malware that misleads the person using the computer of its real intent.
- 13. Taking someone else’s ideas, or work and saying that is it yours especially without permission.
- 14. a large, frequently run program attached to the virus.
- 17. The right given to somebody else from the creator in order to publish their work.
- 18. Someone who uses computers to gain access to unauthorized data.