1:00
en
CR
15
lock:There are two general indications of a secure web page, Websites with https and ____ icon.
hacker:A person who enjoys learning programming languages and computer.
cracker:A person who is illegally accessing someone else’s system, with the intention to distribute malicious software.
copyright:Exclusive rights granted to the creator of an original work that acts as a form of protection provided by the law.
AUP:A set of rules applied by an owner or manager of a network, website or a large computer systems that restrict the ways in which the site or network may be used.
plagiarism:Turning in someone else's work as your own.
finland:_______ has become the first country in the world to declare broadband Internet access a legal right.
Harrasment:This type of cyber crime is done to degrade someone for self-satisfaction with no monetary gain.
shareware:A free software that can be used by anyone; the only downside being that it is usually usable for a limited time period, also known as a trial period.
erule:A term used to describe the legal issues pertaining to the communicative, transactional and distributive aspects of networked information technologies and devices.
ecommerce:Conducting business on the Internet and involves selling and buying of goods or services online.
recycle:_______ your old computers as well as printer ink cartridges and toners.
EULA:The license which comes with commercial software.
phishing:An e-mail fraud in which the perpetrator sends out legitimate-looking e-mails in an attempt to gather personal and financial information from recipients.
disclaimers:Elements of an Acceptable Use Policy.
Across:2. | Elements of an Acceptable Use Policy. | 4. | A person who is illegally accessing someone else’s system, with the intention to distribute malicious software. | 6. | Conducting business on the Internet and involves selling and buying of goods or services online. | 8. | A term used to describe the legal issues pertaining to the communicative, transactional and distributive aspects of networked information technologies and devices. |
| 9. | Turning in someone else's work as your own. | 10. | This type of cyber crime is done to degrade someone for self-satisfaction with no monetary gain. | 13. | A person who enjoys learning programming languages and computer. | 14. | Exclusive rights granted to the creator of an original work that acts as a form of protection provided by the law. |
| | Down:1. | _______ has become the first country in the world to declare broadband Internet access a legal right. | 3. | A free software that can be used by anyone; the only downside being that it is usually usable for a limited time period, also known as a trial period. | 5. | _______ your old computers as well as printer ink cartridges and toners. | 7. | The license which comes with commercial software. |
| 9. | An e-mail fraud in which the perpetrator sends out legitimate-looking e-mails in an attempt to gather personal and financial information from recipients. | 11. | A set of rules applied by an owner or manager of a network, website or a large computer systems that restrict the ways in which the site or network may be used. | 12. | There are two general indications of a secure web page, Websites with https and ____ icon. |
| |
© 2012
PuzzleFast.com, Noncommercial Use Only
Across:2. | Elements of an Acceptable Use Policy. | 4. | A person who is illegally accessing someone else’s system, with the intention to distribute malicious software. | 6. | Conducting business on the Internet and involves selling and buying of goods or services online. | 8. | A term used to describe the legal issues pertaining to the communicative, transactional and distributive aspects of networked information technologies and devices. |
| 9. | Turning in someone else's work as your own. | 10. | This type of cyber crime is done to degrade someone for self-satisfaction with no monetary gain. | 13. | A person who enjoys learning programming languages and computer. | 14. | Exclusive rights granted to the creator of an original work that acts as a form of protection provided by the law. |
| | Down:1. | _______ has become the first country in the world to declare broadband Internet access a legal right. | 3. | A free software that can be used by anyone; the only downside being that it is usually usable for a limited time period, also known as a trial period. | 5. | _______ your old computers as well as printer ink cartridges and toners. | 7. | The license which comes with commercial software. |
| 9. | An e-mail fraud in which the perpetrator sends out legitimate-looking e-mails in an attempt to gather personal and financial information from recipients. | 11. | A set of rules applied by an owner or manager of a network, website or a large computer systems that restrict the ways in which the site or network may be used. | 12. | There are two general indications of a secure web page, Websites with https and ____ icon. |
| |
© 2012
PuzzleFast.com, Noncommercial Use Only