Ethics and Safety measures in computing

123456789101112131415161718
Across
  1. 3. transforming data into an unreadable code.
  2. 6. right relating to new inventions
  3. 8. security system that prevents unauthorized people on internet.
  4. 10. Harassing a person deliberately via intrnet.
  5. 13. brand name, logos, distinctive designs.
  6. 15. and anybody.
  7. 16. legal right granted by law.
  8. 17. intends to harm or damage reputation of any
  9. 18. impression about a person's activities on internet
Down
  1. 1. Programs used to check user's keystrokes
  2. 2. crimical practice of breaching online using voice over.(VoIP)
  3. 4. most common breaches through internet
  4. 5. practice of sending bulk mails till server gets full
  5. 6. Distroy the mental health of a child
  6. 7. Online discussion site
  7. 9. malicious technique of tricking web users.
  8. 11. act of copying.
  9. 12. The maximum amount of data transmitted via
  10. 14. crime ware application that performs automated tasks for cyber criminals.