choice board column b

1234567891011121314151617181920212223
Across
  1. 2. (Internet of Things)things”—that are embedded with sensors, software, and other technologies for the ...
  2. 4. video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
  3. 6. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  4. 7. a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression.
  5. 9. theft the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  6. 11. the act of stealing software that is legally protected. This stealing includes copying, distributing, modifying or selling ...
  7. 12. or digital citizenship Digital citizenship refers to the ability to think critically, behave safely, and participate responsibly in our digital world.
  8. 14. websites and applications that enable users to create and share content or to participate in social networking.
  9. 15. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
  10. 17. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  11. 19. Use the right to use a copyrighted work under certain conditions without permission of the copyright owner. Firewall a fire-resistant barrier used to prevent the spread of fire. Firewalls are built between or through buildings, structures, or electrical ...
  12. 21. footprint refers to the trail of data you leave when using the internet.
  13. 22. Trafficking Traffickers increasingly use internet technologies to advertise the services resulting from their victims' ex- ploitation
  14. 23. is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their ...
Down
  1. 1. Hat Hacker: is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
  2. 3. the correct or acceptable way of communicating on the internet
  3. 5. an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public.
  4. 7. the pratice of deploying people
  5. 8. Intelligence is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence .
  6. 10. the practice of attacking and robbing ships at sea.
  7. 13. wide web s an information system enabling documents and other web resources to be accessed over the Internet.
  8. 16. technologies that are currently developing, or that are expected to be available within the next five to ten years,
  9. 18. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  10. 20. presenting someone else's work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement
  11. 21. . The application of science to the identification, collection, examination, and analysis, of data