Digital Literacy

12345678910111213141516171819202122232425262728293031
Across
  1. 2. this document allows you to purchase software without receiving full rights to the program
  2. 6. a sole right to exclude others from making, using, or selling an invention
  3. 9. a malware that is designed to deny a user or organization access to files unless an amount of money or reward is met
  4. 10. a software design principle, where certain aspects of a program or module are inaccessible to clients/users
  5. 11. a document that stipulates constraints and practices that a user must agree to for access to a computer network, the internet, or a software program
  6. 13. the process of converting a message that has been rendered unreadable back to its original (readable)form
  7. 14. the process of protecting information or data by using mathematical models or letters to scramble it in such as way that one the parties who have the key to unscramble it can access it
  8. 17. software developed by a business and distributed free of charge
  9. 18. software that automatically displays or downloads advertising material when the user is online
  10. 19. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  11. 21. the use of general human knowledge to deceive or manipulate individuals into divulging confidential or personal information
  12. 25. the process of verifying/validating a user or device to make sure they are whom they claim to be, before allowing access to a system or resources
  13. 26. the legal agreements between a service provider and a person who wants to use that service
  14. 27. commercial software that is distributed free to users, eventually either requiring or encouraging users to pay for the continued support of the software
  15. 29. a symbol, word, or words legally registered or established by use as representing a company or product
  16. 30. standard technology for securing an internet connection by encrypting data sent between a website and a browser
  17. 31. a security exercise where cybersecurity expert attempts to find and exploit vulnerabilities in a computer system
Down
  1. 1. a type of malware that spreads between computes causing damage to data and software
  2. 3. the exclusive, legal right given to an creator to publish, print, film, perform, record, any material, as well as authorize others to do the same
  3. 4. the process by which a server determines if the client has permission to use a resource or access to a file. Permission may be granted to specific files only.
  4. 5. a software program that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
  5. 7. the basic rules of conduct users of technology should follow in order to be responsible digital citizens
  6. 8. the use and or distribution of copyrighted computer software in violation of the law
  7. 12. the practice of taking someone else's work or ideas and passing it off as one's own
  8. 15. the doctrine that brief excerpts of copyright material may be quoted for specific purposes
  9. 16. a program camouflaged as something else to breach the security of a computer system
  10. 20. software is code that is designed to be publicly accessible; anyone can inspect, modify, or enhance
  11. 22. the art of protecting networks, devices, and data from unauthorized access
  12. 23. a collection of compromised, hijacked computers and devices that are infected with malware and remotely controlled by a hacker
  13. 24. a collection of websites you visit, emails you send, and information you share online
  14. 28. software that is owned by an organization or individual