Cyber Ethics
Across
- 2. REFERS TO UNWANTED BULK EMAILS THAT COME FROM UNKNOWN SOURCES
- 4. A RIGHT RELATED TO NEW INVENTIONS
- 5. ACT OF HARMING OR HARASSING A PERSON THROUGH INFORMATION TECHNOLOGY IN A DELIBERATE MANNER
- 6. INFORMATION AND COMMUNICATION TECHNOLOGY
- 10. CRIMINAL PRACTICE OF USING SOCIAL INFLUENCE OVER THE TELEPHONE
- 12. ACT OF SENDING AN EMAIL TO A USER, MISLEADING HIM TO BELIEVE THAT IT IS FROM A TRUSTED PERSON OR ORGANISATION
- 13. WHEN A SINGLE LICENSED COPY OF A SOFTWARE IS LOADED INTO MANY COMPUTERS CONTRARY TO THE LICENCE’S TERMS
- 14. REFERS TO BEING AWARE OF THE ETHICAL PRACTICES AND BEHAVING RESPONSIBLY WHILE USING THE INTERNET
Down
- 1. A SECURITY SYSTEM THAT PREVENTS UNAUTHORISED PEOPLE FROM ACCESSING YOUR SYSTEM AND NETWORK
- 3. REFERS TO AN ILLEGAL INTRUSION INTO A COMPUTER
- 5. THE SIMPLEST WAY TO PREVENT PLAGIARISM
- 7. THE PROCESS OF TRANSFORMING DATA INTO AN UNREADABLE CODE
- 8. SURF THE INTERNET UNDER SUPERVISION OF PARENTS
- 9. LEGAL RIGHT GRANTED BY LAW TO THE CREATOR FOR HIS ORIGINAL WORK
- 11. A PROGRAM THAT DISRUPTS THE NORMAL FUNCTIONING OF A COMPUTER