Final output
Across
- 2. could be considered non-desirable.
- 5. Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system
- 6. A numerical value that helps to check if the data transmitted is the same as the data stored and that the recipient has error free data.
- 7. The leftover space on a drive where a file is stored is called.
- 9. The RA 10844 is otherwise known as _?
- 11. Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
- 12. the interactional space or environment created by linking computers together into a communication network.
- 13. any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- 15. market economic activity undertaken via the internet or similar electronic communication networks.
- 18. the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- 21. RAM IS EPHEMERAL. IT MEANS
- 23. A smart card containing the telephone number of the subscriber, encoded network identification details, the PIN and other user data such as the phone book.
- 25. a notoriously slippery term used to denote representations, expressions, or actions ( often of a sexual nature) that are held to be generally offensive and thus unacceptable by society at large.
- 26. a general term for a variety of computer codes ( such as viruses, logic bombs, and 21.Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- 27. pieces of computer code that can infect computer system causing disruptions to their normal operation.
- 28. A smartphone operating system developed by Google.
- 29. of business systems and digital-enabled processes.
- 31. against the known threats that violate
- 32. terrorist activity that targets computer networks and information systems for attack.
- 33. an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- 35. in the infrastructure, process, data,
- 38. facilities and service components that support the
- 39. types or consequences of failure, damage, error,
- 41. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- 43. the act of copying digital material posted online into the storage medium on one’s computer.
- 46. surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- 47. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- 49. the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- 53. those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
- 55. political activism and social protest that uses hacking tools and techniques
- 58. A low power, short range wireless technology designed to provide a replacement for the serial cable.
- 59. the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
- 60. Refers to parts of the Internet not fully accessible through standard search engines like Google, Yahoo etc.
- 61. physical, social, spiritual, financial, political,
- 62. the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
Down
- 1. stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
- 3. online marketplaces enabling individuals and businesses to post a wide variety of items for sale.
- 4. malicious software programs which are infiltrated into computers disguised as benign applications or data.
- 8. it is a shortfall that comes from
- 10. it is the system of hardware,
- 14. thinking, reactive acquisition, and unmanaged
- 16. the right to be left alone; freedom from observation and interference from others.
- 17. an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
- 19. It is the act of publicly revealing previously private personal information about an individual or organization, usually through the Internet.
- 20. a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- 22. harm or any other event in the Cyberspace
- 24. legally institutionalized rights to own and control goods.
- 30. the practice of allowing others to make copies of files stored on a computer via downloading. The practice is generally associated with the sharing of music, movies, images and software via websites dedicated to such copying.
- 32. integrity, availability, and privacy of
- 34. Refers to any computer instructions, data, or programs that can be stored electronically and executed by computer hardware.
- 35. property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
- 36. Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- 37. Safety it is the condition of being protected
- 40. occupational, psychological, educational or
- 42. and agreements of service delivery.
- 44. the activity of altering the code organizing a website so as to alter the visible screen content.
- 45. a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- 48. Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system
- 49. criminal acts that tend to go largely unobserved, unremarked, and unrecorded in official assessments and measures of criminal activity.
- 50. a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- 51. A free and open source software program for reading, writing and manipulating, image and video, PDF meta data.
- 52. related thefts are new trend in employee theft and embezzlement. The widespread use of computers to record business transactions has encouraged some people to use them for illegal purposes.
- 54. visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- 56. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
- 57. A piece of software designed and created to update a computer program or its supporting data, to fix or improve it.