Computer 8

1234567891011121314151617
Across
  1. 2. A method to gain access to specific accounts or devices without permission.
  2. 6. Design Features of a device or app that try to hook you into using it frequently.
  3. 8. Intelligence (AI) A computer program that can perform tasks that typically require human intelligence.
  4. 9. A person who has many followers on social media and can sway the opinions of others.
  5. 10. A belief you form about someone or something based on limited information.
  6. 15. Deception tricking others on the internet by pretending to be someone or sharing false information
  7. 16. engineering a type of online deception that aims to steal personal information by pretending to be someone you trust
  8. 17. Design Features that prioritize what's good for people and help them use technology in a healthy way.
Down
  1. 1. Recognition A type of AI technology that can use a digital image of a face to identify a person.
  2. 3. Privacy The right to control your personal information, including what's collected and shared about you online.
  3. 4. Being true to who you really are, instead of showing only what others want to see.
  4. 5. Automatic routines or things we do, often without even really thinking about them.
  5. 7. Breach An incident when unauthorized people purposely or accidentally expose information, like personally identifiable information or account data.
  6. 11. Identifiable Information (PII) Any information that can be used to identify someone, like full names, addresses, phone numbers, email addresses, or even photos.
  7. 12. Audience Unknown or unanticipated people who might see information about you online, now or in the future.
  8. 13. Footprint All of the information online about a person, either posted by that person or others, intentionally or unintentionally.
  9. 14. Well-Being Experiencing media and technology in ways that support one's mental, physical, social, and emotional health.