brooks
Across
- 3. Encryption is the process of converting readable information (plaintext) into an unreadable, scrambled format (ciphertext) using algorithms and digital keys.
- 7. Balance – Managing your technology use so it doesn’t interfere with your health, relationships, or responsibilities.
- 8. Cybersecurity is the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage.
- 9. Commons – A system that lets creators share their work with specific permissions for how others can use it.
- 14. each of the following terms. Use Google to help you with the definitions.
- 15. – Using digital devices (like phones or computers) to harass, threaten, or hurt someone.
- 16. A digital citizen is someone who uses the internet, computers, and digital technology regularly, skillfully, and responsibly.
- 18. – Someone who recognizes harmful behavior and takes action to stop it or support the person being hurt.
- 21. – Moral principles that guide what is right and wrong behavior.
- 22. Intelligence (AI) – Technology that allows computers to perform tasks that normally require human thinking, like learning or decision-making.
- 23. Use – Being aware of how and why you’re using technology and making intentional choices about it.
- 27. Footprint A digital footprint is the unique trail of data you leave behind while using the internet, including website visits, emails, social media posts, and online purchases.
- 28. Digital Responsibility – Using technology in a safe, respectful, and ethical way, including protecting your privacy and treating others well online.
Down
- 1. – False or inaccurate information that is shared without the intent to deceive.
- 2. Settings Privacy settings are digital controls on apps, websites, and devices that allow you to manage your personal data and determine who can see your content.
- 3. – Understanding and sharing how someone else feels, even if you’re not in their situation.
- 4. Phishing is a cybercrime where attackers impersonate legitimate entities—like banks, employers, or trusted brands—via email, text, or phone to steal sensitive information.
- 5. – Illegally copying, downloading, or sharing copyrighted content without permission.
- 6. Information Personal information, also known as Personally Identifiable Information (PII) or personal data, is any data that can identify, locate, or contact a specific individual,
- 10. Time – The amount of time a person spends using devices like phones, computers, or TVs.
- 11. Use – A rule that allows limited use of copyrighted material without permission for purposes like education, criticism, or news.
- 12. – A step-by-step set of instructions a computer follows to solve a problem or complete a task.
- 13. Literacy Media literacy is the ability to access, analyze, evaluate, create, and act upon all forms of communication.
- 14. – False information that is deliberately created and shared to mislead people.
- 17. Addiction – When someone feels unable to control their use of technology, even when it negatively affects their life.
- 19. Etiquette Digital etiquette, or netiquette, refers to the set of rules, standards, and behavioral norms for interacting respectfully and safely online.
- 20. – Using someone else’s work or ideas and presenting them as your own without giving credit.
- 22. Reality (AR) – Technology that overlays digital content (like images or sounds) onto the real world, often through a phone or headset.
- 24. – A person who sees something happening (like bullying) but does not take action.
- 25. Identity Online identity (or digital identity) is the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet.
- 26. – A law that gives creators ownership and control over how their work is used by others.