Across |
1. | Copying, loaning, borrowing, renting, or distributing software can be a _________ of copyright law |
4. | ________ cookies are harmless and are intended to provide customized service |
5. | ________ track how often users visit a site and allow for personalization |
6. | __________ is the act of defacing or destroying computer equipment |
7. | Spreading information without personal content |
9. | _______copies itself repeatedly, using up resources and possibly shutting down the computer or network |
10. | Encryption algorithm that switches order of charachters |
12. | ________is hardware and/or software that protects a network’s resources from intrusion |
13. | It is a process of converting readable data into unreadable characters to prevent unauthorized access |
14. | Actions of individuals and companies that affect society |
16. | _____________ is the act of stealing computer equipment |
17. | _______ affects a computer negatively by altering the way the computer works |
19. | A single-user ________ agreement allows users to install the software on one computer |
20. | Internet fraud technique to trick someone into providing personal information or spending money |
21. | _________ gain unauthorized access to computer systems “for fun” |
22. | Fraud in which merchandise is selected and papyment is made, but it is not delivered |