Crossword: Networking Concepts and Cyber Ethics

123456789101112131415
Across
  1. 2. The unwanted bulk emails that comes from unknown sources are called __________
  2. 3. An illegal intrusion into a computer system or network is known as ___________
  3. 7. ___________ refers to being aware of the ethical practices
  4. 8. The simplest way to prevent plagiarism is through proper ___________
  5. 9. A digital footprint is also known as a _____________
  6. 12. When multiple mismatched copies of a file are stored on different computers it is called data ___________
  7. 13. ___________ is a security system that prevents unauthorised people from accessing your system and network
  8. 14. Presenting someone's else's work as yours is called __________
Down
  1. 1. Illegally shared software copies are called
  2. 4. Acess is controlled by a password and _________system
  3. 5. Harmful online actions are broadly called
  4. 6. __________ is the criminal practice of using social influence over the telephone system
  5. 10. _________ can be defined as the legal rules and restrictions imposed on online users
  6. 11. When a single licenced copy of software is loaded into many computers contrary to the licence's terms it is called _____________
  7. 15. A city-wide network is managed by a single entity is a ____________