Across
- 3. Invader computer program
- 5. Software allowed to be used for fixed trial periods
- 8. Sending/Receiving personal information to a stranger is a threat to
- 9. It is ______ to use someone's words or ideas without their permission
- 10. Acknowledging someone's words or ideas
Down
- 1. Unlawful duplication of copyrighted software
- 2. Source which can easily spread infection in softwares
- 4. Precautions taken to be safe from damage causing softwares
- 6. Cure for troublesome software program
- 7. Theft of someone's words or ideas
