ITS610 Crossword Puzzle

1234567891011121314151617181920
Across
  1. 2. _______ Hat Hackers often work as certified “Ethical Hackers” hired by companies to test their integrity of their systems.
  2. 4. one of the ways to improve privacy protection is through ___________.
  3. 7. The creation of information tailored to your preferences is a ___________.
  4. 11. study of what it means to “do the right thing”.
  5. 12. public _____ Right is a right to show a copy of the work directly or by means of a film, slide or television image at a public place or to transmit it to the public.
  6. 13. sources of ethics in Islam are ___________ and hadith.
  7. 15. privacy risks can be separated into 2 categories which are risks to individuals and risk to ___________.
  8. 16. ___________ is the use of computers and computer networks as a means of protest to promote political cause.
  9. 19. refusal to recognise or admit project problems is one of the causes of failures in computer system under what category?
  10. 20. _________ protect inventions of new things or processes.
Down
  1. 1. people who are anti-technology.
  2. 3. examples of fair use include commentary, __________, search engine, criticism, parody, news reporting, teaching, library archiving and scholarship.
  3. 5. analysing data to determine characteristics of people most likely to engage in a certain behaviour is called computer _____________.
  4. 6. a consequentialist view that increase happiness and satisfy a person’s needs and values.
  5. 8. the practice of moving business process to another country.
  6. 9. one of the examples of hacking technique is _________.
  7. 10. collective way of life, or way of doing things.
  8. 14. individual’s own principles regarding right and wrong.
  9. 17. an alternate method of work where the employee, works from home.
  10. 18. gap between individuals, households, businesses and geographic areas at different socio-economic levels with regard both to their opportunities to access ICTs and to their use of the internet is called the digital __________.