Across
- 2. The unwanted bulk emails that comes from unknown sources are called __________
- 3. An illegal intrusion into a computer system or network is known as ___________
- 7. ___________ refers to being aware of the ethical practices
- 8. The simplest way to prevent plagiarism is through proper ___________
- 9. A digital footprint is also known as a _____________
- 12. When multiple mismatched copies of a file are stored on different computers it is called data ___________
- 13. ___________ is a security system that prevents unauthorised people from accessing your system and network
- 14. Presenting someone's else's work as yours is called __________
Down
- 1. Illegally shared software copies are called
- 4. Acess is controlled by a password and _________system
- 5. Harmful online actions are broadly called
- 6. __________ is the criminal practice of using social influence over the telephone system
- 10. _________ can be defined as the legal rules and restrictions imposed on online users
- 11. When a single licenced copy of software is loaded into many computers contrary to the licence's terms it is called _____________
- 15. A city-wide network is managed by a single entity is a ____________
