choice board column b
Across
- 2. (Internet of Things)things”—that are embedded with sensors, software, and other technologies for the ...
- 4. video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
- 6. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- 7. a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression.
- 9. theft the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- 11. the act of stealing software that is legally protected. This stealing includes copying, distributing, modifying or selling ...
- 12. or digital citizenship Digital citizenship refers to the ability to think critically, behave safely, and participate responsibly in our digital world.
- 14. websites and applications that enable users to create and share content or to participate in social networking.
- 15. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
- 17. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- 19. Use the right to use a copyrighted work under certain conditions without permission of the copyright owner. Firewall a fire-resistant barrier used to prevent the spread of fire. Firewalls are built between or through buildings, structures, or electrical ...
- 21. footprint refers to the trail of data you leave when using the internet.
- 22. Trafficking Traffickers increasingly use internet technologies to advertise the services resulting from their victims' ex- ploitation
- 23. is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their ...
Down
- 1. Hat Hacker: is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
- 3. the correct or acceptable way of communicating on the internet
- 5. an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public.
- 7. the pratice of deploying people
- 8. Intelligence is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence .
- 10. the practice of attacking and robbing ships at sea.
- 13. wide web s an information system enabling documents and other web resources to be accessed over the Internet.
- 16. technologies that are currently developing, or that are expected to be available within the next five to ten years,
- 18. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- 20. presenting someone else's work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement
- 21. . The application of science to the identification, collection, examination, and analysis, of data