Across
- 2. False websites that fish for personal and financial information by planting false URLs in Domain Name Servers.
- 4. ______ Act 1948, act that touches on racial sensitivities.
- 6. Type of contest where a prize or prizes may be awarded to a winner or winners.
- 8. The practice of virtue, morality, and manners in Islamic theology and philosophy.
- 11. Cyber-______ is a process employed by child abusers to prepare a potential target for abuse by befriending and gaining the trust of a child.
- 14. Increase happiness and what satisfies a person's needs and values.
- 16. Permit the collection of personal info.
- 17. Computer ______ means analyzing data to determine characteristics of people most likely to engage in a certain behavior.
- 18. Anti-technology, those who dislike using modern science and technology.
- 19. Hobby or profession of working with computers and breaking into computer systems
Down
- 1. The right to act without interference.
- 3. Name given to hackers who break into computers for criminal gain.
- 5. An alternate method of work where an employee works from home or a location closer to their home like a branch office.
- 7. ______ as a teaching tool has sparked interest in education. It provides an interactive environment for students to engage and practice 21st century skills.
- 9. Roger's Model consists of knowledge, persuasion, decision occurs, implementation and ______.
- 10. A company pays another company to build parts for its products or services instead of performing those task itself.
- 12. ______ speech is speech which attacks a person or group on the basis of attributes such as gender, ethnic origin, religion, race, disability, or sexual orientation.
- 13. Protects against copying the "expression" in a work, not against copying the work's ideas.
- 15. Define as manner, character, and proper behavior.
- 17. An intellectual property right relating to inventions and granted by government for a new, useful and non-obvious invention.
