More cards in this set

Card 6

Front

companies have to ask for __ to use the data for other purposes

Back

Preview of the front of card 6

Card 7

Front

logging into a computer without permission is __ access

Back

Preview of the front of card 7

Card 8

Front

unauthorised modification includes the destruction and __ of files

Back

Preview of the front of card 8

Card 9

Front

the stealing of identity is called?

Back

Preview of the front of card 9

Card 10

Front

which act protects people original work from being used?

Back

Preview of the front of card 10

Card 11

Front

__ commons licenses

Back

Preview of the front of card 11

Card 12

Front

a consequence of illegal file sharing?

Back

Preview of the front of card 12

Card 13

Front

illegal file sharing can cause your internet service provider to ban you from the?

Back

Preview of the front of card 13

Card 14

Front

illegal file sharing can have a huge impact on the music and __ industries

Back

Preview of the front of card 14

Card 15

Front

breaking the copyright law is called?

Back

Preview of the front of card 15
View more cards