My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

TECH FOUNDATION STUDY GUIDE 1

Across
the ability to control information one reveals about oneself over the Internet and the ability to control who can access that information
a type of software license and a legal agreement that allows users to run the software package simultaneously
the activity of converting data or information into code
a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system
policy definition phase where users are granted permission to use computer hardware and/or software
viewing private accounts, messages, files or resources when one has not been given permission from the owner to do so
a disk that is used to salvage data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally
a broad philosophical concept that goes beyond simple right and wrong and looks towards creating safe and healthy online environments
moral principles that govern a person's or group's behavior
any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime
Use of information that is expressly allowed under a licensing agreement
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
Down
the combination of characteristics or qualities that form an individual's distinctive character
a self-replicating program able to propagate itself across a network, typically having a detrimental effect
a legal instrument governing the usage or redistribution of software
the unauthorized use or reproduction of another's work
a program designed to breach the security of a computer system while ostensibly performing some innocuous function
a number of interconnected computers, machines, or operations
: software used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses
an identification used by a person with access to a computer network
the combination of characteristics or qualities that form an individual's distinctive character
a person who uses computers to gain unauthorized access to data
a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct
a portion of a hard disk, floppy disk, or similar data storage device that contains code for booting programs (usually, but not necessarily, operating systems) stored in other parts of the disk