Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

Web Ethics and Safety

1
2
3
               
     
     
4
5
6
         
7
         
8
 
9
                               
             
10
                       
             
           
11
                                           
           
 
12
                   
       
13
                     
14
             
         
       
15
16
               
   
17
             
       
       
18
                           
       
   

Across
3.granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production
9.computer program which replicates and spreads itself from one computer to another (2 Words)
10.software designed to protect computers from viruses
11.method through which hackers can gain access to a computer (3 Words)
12.exception to copyright infringement (2 Words)
13.ownership of any creative work or invention (2 Words)
16.creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic device
17.unauthorized reproduction or distribution of copyrighted materials, information or production
18.network controller which connects network devices and allows effective communication between these devices (2 Words)
Down
1.someone who illegally gains access to others’ computer for their own profits
2.device which monitors network activities for malicious attacks and produces reports to a management station (3 Words)
3.use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
4.Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people, usually for sexual or other abusive purposes (2 Words)
5.security component which encrypts data and keeps it private within a public network (3 Words)
6.computer device which forwards data packets from one network to another
7.fraud which involves stealing personal information for financial gain through e-mail (2 Words)
8.crime which occurs when someone’s personal and financial information is stolen in order to impersonate him or her for financial gain (2 Words)
14.use of other people’s words, thoughts or ideas without crediting the source
15.collection of computers controlled by users other than their owners to perform automated tasks over the Internet

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us