Kaitlyn Module 5 Computers Crossword

1234567891011121314151617
Across
  1. 1. cybercriminal who has the same intent as a cracker but does not have the technical skills and knowledge
  2. 3. the ___________ agreement gives the right to use a program or app.
  3. 7. the illegal copying, installation, use, distribution, or sale of software in any way other than that is expressed in the license agreement
  4. 9. a written guidelines that helps determine whether a specific action is ethical/unethical or allowed/not allowed
  5. 10. the process of converting data that is readable by humans into encoded characters to prevent unauthorized access
  6. 11. illegal act that occurs when someone steals software media, intentionally erases programs illegally registers/activates a program or illegally copies a program
  7. 13. the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
  8. 16. biometric ________ that authenticates a person’s identity by translating a personal characteristic.
  9. 17. a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster
Down
  1. 2. a notice that guarantees a user or website is legitimate
  2. 4. Online or Internet-based illegal acts, such as distributing malicious software or committing identity theft
  3. 5. programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices AKA malicious software
  4. 6. a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster
  5. 8. a small text file that a web server stores on your computer
  6. 12. hardware/software that protects a network’s resources from intrusion by users on another network.
  7. 14. a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
  8. 15. a program that displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services