Computer Security and Safety, Ethics, and Privacy
Across
- 2. The act of defacing or destroying computer equipment.
- 5. A duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
- 8. supplies A device that allows a computer to keep running for at least a short time when the primary power source is lost.
- 9. The moral guidelines that govern the use of computers and information systems.
- 10. A notice that guarantees a user or a Web site is legitimate.
- 12. The act of stealing computer equipment.
- 13. is the discovery, collection, and analysis of evidence found on computers and networks.
- 14. The prolonged malfunction of a computer.
- 17. The authorization that grants one user the right to use a software package
- 19. Occurs when someone steals software media, intentionally erases programs, illegally copies a program, and illegally registers and/or activates a program.
- 21. Occurs when someone steals personal or confidential information.
- 22. A process of converting readable data into unreadable characters to prevent unauthorized access.
- 24. An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
- 25. An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender.
Down
- 1. The rights to which creators are entitled for their work.
- 3. The act of verifying protected electronic data and involves the required activation by the consumer shortly or directly after purchasing the software or service.
- 4. Allows individuals to detect wireless networks while driving a vehicle through the area.
- 6. A condition resulting from focusing the eyes on a computer or other display device for protracted, uninterrupted periods of time.
- 7. An appliance or device designed to protect electrical devices from voltage spikes.
- 11. A strategy designed to prevent illegal distribution of movies, music, and other digital content.
- 15. Occurs when someone the computer consumes someone's entire social life.
- 16. Authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital in a computer.
- 18. A condition in which the prolonged performance of repetitive actions, typically with the hands, causes pain or impairment of function in the tendons and muscles involved.
- 20. protects any tangible form of expression.
- 23. Any item that you must carry to gain access to a computer or computer facility.