Across
- 2. Copying someone’s work and claiming it as your own.
- 4. Unwanted bulk emails sent to many people.
- 6. The online record you leave behind.
- 7. Ethical rules to follow while using the internet.
- 10. Illegal copying or sharing of software.
- 12. Unethical act of harassing someone online.
- 14. A person who breaks into systems.
- 15. Falsely pretending to be someone to steal info.
- 16. A person who breaks into systems to cause harm or steal data.
- 17. The unique ID every device has on a network.
- 18. A malicious program that spreads by itself.
- 19. Ethical use of technology and internet.
Down
- 1. Fake websites or emails used to trick users.
- 3. The act of accessing a system without permission.
- 5. A small file that stores user data in the browser.
- 7. A malicious trick where users click on invisible or disguised elements.
- 8. A legal right that protects original digital works.
- 9. A system that filters network traffic for safety.
- 11. Secret word used to access an account.
- 13. Transforming information to hide its meaning.
