1:00
en
CR
15
lock:There are two general indications of a secure web page, Websites with https and ____ icon.
hacker:A person who enjoys learning programming languages and computer.
cracker:A person who is illegally accessing someone else’s system, with the intention to distribute malicious software.
copyright:Exclusive rights granted to the creator of an original work that acts as a form of protection provided by the law.
AUP:A set of rules applied by an owner or manager of a network, website or a large computer systems that restrict the ways in which the site or network may be used.
plagiarism:Turning in someone else's work as your own.
finland:_______ has become the first country in the world to declare broadband Internet access a legal right.
Harrasment:This type of cyber crime is done to degrade someone for self-satisfaction with no monetary gain.
shareware:A free software that can be used by anyone; the only downside being that it is usually usable for a limited time period, also known as a trial period.
erule:A term used to describe the legal issues pertaining to the communicative, transactional and distributive aspects of networked information technologies and devices.
ecommerce:Conducting business on the Internet and involves selling and buying of goods or services online.
recycle:_______ your old computers as well as printer ink cartridges and toners.
EULA:The license which comes with commercial software.
phishing:An e-mail fraud in which the perpetrator sends out legitimate-looking e-mails in an attempt to gather personal and financial information from recipients.
disclaimers:Elements of an Acceptable Use Policy.
Across:| 2. | Elements of an Acceptable Use Policy. | | 4. | A person who is illegally accessing someone else’s system, with the intention to distribute malicious software. | | 6. | Conducting business on the Internet and involves selling and buying of goods or services online. | | 8. | A term used to describe the legal issues pertaining to the communicative, transactional and distributive aspects of networked information technologies and devices. |
| | 9. | Turning in someone else's work as your own. | | 10. | This type of cyber crime is done to degrade someone for self-satisfaction with no monetary gain. | | 13. | A person who enjoys learning programming languages and computer. | | 14. | Exclusive rights granted to the creator of an original work that acts as a form of protection provided by the law. |
| | Down:| 1. | _______ has become the first country in the world to declare broadband Internet access a legal right. | | 3. | A free software that can be used by anyone; the only downside being that it is usually usable for a limited time period, also known as a trial period. | | 5. | _______ your old computers as well as printer ink cartridges and toners. | | 7. | The license which comes with commercial software. |
| | 9. | An e-mail fraud in which the perpetrator sends out legitimate-looking e-mails in an attempt to gather personal and financial information from recipients. | | 11. | A set of rules applied by an owner or manager of a network, website or a large computer systems that restrict the ways in which the site or network may be used. | | 12. | There are two general indications of a secure web page, Websites with https and ____ icon. |
| |
© 2012
PuzzleFast.com, Noncommercial Use Only
Across:| 2. | Elements of an Acceptable Use Policy. | | 4. | A person who is illegally accessing someone else’s system, with the intention to distribute malicious software. | | 6. | Conducting business on the Internet and involves selling and buying of goods or services online. | | 8. | A term used to describe the legal issues pertaining to the communicative, transactional and distributive aspects of networked information technologies and devices. |
| | 9. | Turning in someone else's work as your own. | | 10. | This type of cyber crime is done to degrade someone for self-satisfaction with no monetary gain. | | 13. | A person who enjoys learning programming languages and computer. | | 14. | Exclusive rights granted to the creator of an original work that acts as a form of protection provided by the law. |
| | Down:| 1. | _______ has become the first country in the world to declare broadband Internet access a legal right. | | 3. | A free software that can be used by anyone; the only downside being that it is usually usable for a limited time period, also known as a trial period. | | 5. | _______ your old computers as well as printer ink cartridges and toners. | | 7. | The license which comes with commercial software. |
| | 9. | An e-mail fraud in which the perpetrator sends out legitimate-looking e-mails in an attempt to gather personal and financial information from recipients. | | 11. | A set of rules applied by an owner or manager of a network, website or a large computer systems that restrict the ways in which the site or network may be used. | | 12. | There are two general indications of a secure web page, Websites with https and ____ icon. |
| |
© 2012
PuzzleFast.com, Noncommercial Use Only