CHAPTER 8 & 9

12345678910111213141516171819202122232425262728293031323334
Across
  1. 2. Grant inventors the right to stop others from manufacturing, using, or selling (including importing) their inventions for a period of 20 years from the date the patent is filed.
  2. 3. Software that’s intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering.
  3. 7. An unwanted piggyback program that downloads with the software you want to install from the Internet and then runs in the background of your system.
  4. 8. Doing anything with a computer that’s unrelated to a job (such as playing video games) while one’s supposed to be working.
  5. 9. A simplified licensing scheme that enables copyright holders to grant certain rights to a work while retaining other rights.
  6. 13. A program that attempts to travel between systems through network connections to spread infections. Worms can run independently of host file execution and are active in spreading themselves.
  7. 15. A word, phrase, symbol, or design—or a combination of these—that uniquely identifies and differentiates the goods (or services) of one party from those of another.
  8. 16. Any part of the Internet that you can’t find by using a search engine, such as areas protected by a password or a paywall.
  9. 21. A creator’s exclusive rights to use a work of intellectual property, such as making copies of it or selling it.
  10. 22. Any criminal action perpetrated primarily through the use of a computer.
  11. 23. A hacker who breaks into systems just for the challenge of it (and who doesn’t wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems.
  12. 25. A copy of a computer file that can be used to replace the original if it’s lost or damaged.
  13. 26. Software specifically designed to detect viruses and protect a computer and files from harm.
  14. 28. A hacker who uses his or her knowledge to destroy information or for illegal gain.
  15. 30. A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. This makes it more difficult for antivirus programs to detect the virus.
  16. 32. Waves that illustrate the loudness of a sound or the brightness of the colors in an image at a given moment in time.
  17. 34. Unwanted or junk e-mail.
Down
  1. 1. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  2. 2. Violating a software license agreement by copying an application onto more computers than the license agreement permits.
  3. 4. Legal documents (or disclaimers) that delineate how copyrighted material can be used.
  4. 5. A computer that is controlled by a hacker who uses it to launch attacks on other computer systems.
  5. 6. Refers to products derived from the mind, such as works of art and literature, inventions, and software code.
  6. 10. A software program or hardware device designed to prevent unauthorized access to computers or networks.
  7. 11. A very well-concealed part of the Deep Web where many illegal and illicit activities take place.
  8. 12. The use of a single unifying device to handle media, Internet, entertainment, and telephony needs.
  9. 14. A computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged.
  10. 17. A cross between black and whit hat hacker.
  11. 18. The interconnection of uniquely identifiable embedded computing devices that transfer data over a network without requiring human-to-human or human-to-computer interaction.
  12. 19. The process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or Social Security numbers or other sensitive information that could lead to identity theft.
  13. 20. A computer program that appears to be something useful or desirable (such as a game or a screen saver), but at the same time does something malicious in the background without the user’s knowledge.
  14. 24. A device that can display e-text and that has supporting tools, like note taking, bookmarks, and integrated dictionaries.
  15. 27. A small text file that some websites automatically store on a client computer’s hard drive when a user visits the site.
  16. 29. The act of copying text or ideas from someone else and claiming them as your own.
  17. 31. Anything designed to deceive another person either as a practical joke or for financial gain.
  18. 33. Electronically identifying someone in a photo or post.