Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

IS Security and Ethics (Use Gaps between words)

Vish

Basic concepts about the security and ethics are explored.

1           2    
3  
4                      
  5            
   
6                                  
   
  7                          
    8
     
9       10             11            
       
12                    
13                      
     
14       15        
  16                          
     
17                          
18    
19             20              
     
21              
  22                        
 

Across
1.Copying, loaning, borrowing, renting, or distributing software can be a _________ of copyright law
4.________ cookies are harmless and are intended to provide customized service
5.________ track how often users visit a site and allow for personalization
6.__________ is the act of defacing or destroying computer equipment
7.Spreading information without personal content
9._______copies itself repeatedly, using up resources and possibly shutting down the computer or network
10.Encryption algorithm that switches order of charachters
12.________is hardware and/or software that protects a network’s resources from intrusion
13.It is a process of converting readable data into unreadable characters to prevent unauthorized access
14.Actions of individuals and companies that affect society
16._____________ is the act of stealing computer equipment
17._______ affects a computer negatively by altering the way the computer works
19.A single-user ________ agreement allows users to install the software on one computer
20.Internet fraud technique to trick someone into providing personal information or spending money
21._________ gain unauthorized access to computer systems “for fun”
22.Fraud in which merchandise is selected and papyment is made, but it is not delivered
Down
2.Create and sell electronic profiles
3.______ is a malicious program that hides within or looks like a legitimate program; does not copy itself
8.Gives content creators the right to control the use and distribution of their work
11.__________ occurs when someone illegally copies a program
15.______ create and share programs designed to gain unauthorized access to computer systems.
18.Unauthorized copying and distribution

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us Blog