Computer Science and Ethics

1234567891011121314151617181920212223
Across
  1. 3. A legal right that protects creators’ original works from being copied or used without permission.
  2. 6. Capturing or accessing digital communications, like emails or texts, often for legal investigations.
  3. 10. A set of symbols and letters that can be displayed or used in a digital system (e.g., Unicode).
  4. 11. Discarded electronic devices, which can be harmful to the environment if not properly recycled.
  5. 15. The unauthorised copying, sharing, or downloading of copyrighted content like software, music, or films.
  6. 16. The person or organisation that decides how and why personal data is processed.
  7. 17. Malicious software designed to damage or disrupt computer systems.
  8. 20. Permission given by someone for their data to be used or shared.
  9. 21. The trail of data left behind when using the internet, such as websites visited or posts made.
  10. 23. A situation where there’s a difficult choice between right and wrong, often with no clear answer.
Down
  1. 1. Reducing the environmental impact of technology, such as e-waste and energy consumption.
  2. 2. The right to keep personal information or communications from being shared or observed without consent.
  3. 4. Gaining access to data or systems without permission—commonly known as hacking.
  4. 5. When artificial intelligence systems produce unfair outcomes due to the way they are trained or designed.
  5. 7. Creations of the mind, such as inventions, literary works, designs, and software, protected by law.
  6. 8. Information about an individual that can be used to identify them, such as name, address, or date of birth.
  7. 9. Any operation performed on personal data, such as collecting, storing, or deleting it.
  8. 12. The individual whose personal data is being collected or processed.
  9. 13. Monitoring of behaviour or communications, often by governments or organisations.
  10. 14. Using technology to harass, threaten, or embarrass someone online.
  11. 18. Illegally gaining access to a computer system or network.
  12. 19. Principles that govern a person’s or group’s behaviour, especially regarding right and wrong in digital use.
  13. 21. The gap between people who have access to digital technology and those who do not.
  14. 22. The control or suppression of what people can access or express, particularly online.