Cyber Ethics

1234567891011121314151617181920
Across
  1. 3. It refers to being aware of the ethical practices, and behaving responsibly and appropriately while using the internet
  2. 4. When a single licenced copy of a software is loaded into many computers contrary to the licence's terms, it is called
  3. 5. Is the process of transforming data into an unreadable code
  4. 6. Fraudulently obtaining money from depositors by claiming to be an authorised bank or a financial institution
  5. 9. It is an integral part of our day-to-day life
  6. 14. This refers to an act of stealing and misusing someone's personal information
  7. 15. It is a program or a set of programs that disrupts the normal functioning of a computer
  8. 17. The simplest way to prevent plagiarism is through proper
  9. 18. It refers to the act of using or imitating the language and thoughts of another person as one's orginal work
  10. 19. It refers to a set of procedure, moral principles, and ethical practices that regulates the use of a computer and the internet
  11. 20. It is an act of sending an email to a user, misleading him to belive that it is from a trusted person or organisation
Down
  1. 1. It refers to the original creations of a person related to intangible categories, like literature, art, design, symbol, logos, etc
  2. 2. When software is copied and distributed illegally, it is called
  3. 7. Is a legal right granted by law to the creator for his orginal work
  4. 8. The trail of data a person leaves behind when using the internet, including websites visited, social media posts, online searches, and emails.
  5. 10. Is an act of harming, harassing, or targeting a person using the internet in a deliberate manner
  6. 11. It refers to criminal activities that involve the use of computer, networks, and the internet connections with the intent to cause harm to individuals or their digital devices.
  7. 12. An illegal intrusion into a computer system or network is known as
  8. 13. Spam attackers keep sending bulk mails till the mail server gets full,this practice is known as
  9. 16. The unwanted bulk emails that come from unknown sources are called