AES Digital Citizenship (Russell)
Across
- 4. is the stealing of someone else’s words or ideas and presenting them as your own
- 6. is the stealing of copyrighted work by downloading or copying it in order to keep, sell or give away without permission and without paying
- 7. an economic inequality between groups, broadly construed, in terms of access to, use of, or knowledge of information and communication technologies
- 9. represents works whose intellectual property rights have expired or works that have been released by the creator
- 11. gives the creator of an original work exclusive right to that work, usually for a limited time
- 14. the works, inventions or creations of an individual, group or business
- 16. does not give someone the right to bully or harass someone else.
- 20. Attribution is a public copyright license that enables free distribution of copyrighted work WITH the proper credit to the creator.
- 21. thief uses identity to gain medical treatment or commit insurance fraud.
- 23. use upper and lower case letters, numbers and symbols. (8 or more characters)
- 24. spread from one machine to another, rapidly, without human action.
- 26. a person who has been exposed to technology from a young age and is pretty comfortable using it
- 28. if the network is _______________, that means the data sent back and forth between your device and wireless router can be viewed by others.
- 29. is an agreement between you and the owner of a software program that allows you to perform certain tasks with the software
- 30. is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as worms and viruses.
Down
- 1. thief spends another person’s money or opens a line of credit in their name.
- 2. thief uses someone else’s identity to commit a crime.
- 3. digital divide between countries
- 5. is when someone wrongfully obtains and uses another person’s personal data, typically for economic gain
- 7. are what create a digital footprint
- 8. attaches itself to a file or program, enabling it to spread from one computer to another.
- 10. is software that has malicious intent.
- 12. Once information is added to a digital footprint, it may remain there ____________.
- 13. thief uses SSN to file taxes or reap other governmental benefits
- 15. the use of Information Technology to harm or harass other people in a deliberate, repeated, and hostile manner
- 17. All of the information online about a person either posted by that person or others, intentionally or unintentionally.
- 18. is the act of cracking into a computer to steal information.
- 19. textual content, images, and multimedia that the creator must have the right to use.
- 22. any program used by a computer
- 25. The “___________” rule of copyright law explains when free use of copyrighted material is acceptable. This rule applies to any and all copyrighted works.
- 27. The primary goal of an ______________ is to trick someone into giving money or sharing information.