Across
- 2. It refers to criminal activity that involve the use of computers, network and the internet connection with the intend to cause harm to individuals or their digital devices
- 7. It means accessing the Internet in an illegal manner
- 10. They are highly technical people who secretly break into computers to steal important data or sometimes to destroy it
- 13. It the process of transforming data into unreadable code
- 14. It refers to the act if using or imitating the language and thought of another person as ones original work
- 15. While using the internet, we need to follow certain moral rules, which includes honesty, respecting the privacy of others, and the property rights. These rules are called
Down
- 1. Sometimes, spam attackers keep sending bulk mails till the mail server gets full this practice is known as
- 3. It is the process which convert the encrypted information into a readable form
- 4. It is a process in which we purchase a single licensed copy of the software and load it into several computers contrary to licences term.
- 5. Hacking which is done a good cause, such as national security, is known as
- 6. the original writer and the source from which the material has been taken is essential and is known as
- 8. When software is copied and distributed illegally it is called
- 9. It is a security system that prevent unauthorised people from accessing your system and network
- 11. It refers unwanted bulk emails that come from unknown sources
- 12. It refers to an illegal intrusion into a computer system or network
