Across
- 3. ___ to being aware of the ethical practices, and behaving responsibly and appropriately while using the internet.
- 4. practices unethical practices mean accessing the intrnet in an illigal manner.
- 7. piracy ___ software copied and distributed illegally.
- 8. crime cyber crime refers to criminal activities that involve the use of computer.
- 10. ___ refers to the act of using or imitating the language and thoughts of another person as one's original work.
- 11. ___ refers to unwanted bulk email that come from unknown source.
- 12. ___ refers to an illigal intrusion into a computer system or network.
Down
- 1. property ___ is an impression or a information about a person that exists on the internet.
- 2. footprint ___ in general, footprint is the impression left by a foot or shoe on the ground or a surface.
- 5. Ethics information and communication technology (ITC) is an integral part of our day life.
- 6. your trademarks ___ protects your brand name's logo, packaging,and other distinctive designs.
- 9. Hacking ___ is done for a good cause, such as national security.
- 10. your invention ___ is a right related to the new inventions that grants the inventor the sole.
