Computer 8 Day 2 Digital Citizenship Game

1234567891011121314151617181920212223242526272829303132333435363738394041
Across
  1. 3. a self-replicating program able to propagate itself across a network, typically having a detrimental effect.
  2. 5. software intended to damage a computer, mobile device, computer system, or computer network, or to take partial control over its operation
  3. 6. a blustering, mean, or predatory person who, from a perceived position of relative power, intimidates, abuses, harasses, or coerces people, especially those considered unlikely to defend themselves
  4. 8. a computer program that searches documents, especially on the World Wide Web, for a specified word or words and provides a list of documents in which they are found.
  5. 9. the programs and other operating information used by a computer.
  6. 10. Also called Tro·jan .Computers. a nonreplicating computer program planted illegally in another program to do damage locally when the software is activated.
  7. 12. someone who stands up to a bully
  8. 16. a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
  9. 17. irrelevant or inappropriate messages sent on the internet to a large number of recipients.
  10. 19. the status of a literary work or an invention whose copyright or patent has expired or that never had such protection.
  11. 20. reasonable and limited use of copyrighted material so as not to infringe upon copyright
  12. 21. Usually the World Wide Web (except when used before a noun). a system of extensively interlinked hypertext documents: a branch of the internet.
  13. 22. websites and applications that enable users to create and share content or to participate in social networking.
  14. 24. Digital Technology. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
  15. 25. a person who is present at an event or incident but does not take part.
  16. 28. a person who develops the skills and knowledge to effectively use the internet and other digital technology, especially in order to participate responsibly in social and civic activities
  17. 29. a person who makes a deliberately offensive or provocative online post.
  18. 34. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  19. 36. a representation of a facial expression such as:-) (representing a smile), formed by various combinations of keyboard characters and used to convey the writer's feelings or intended tone
  20. 37. an identification used by a person with access to a computer, network, or online service.
  21. 38. Computers. software that is installed surreptitiously and gathers information about an internet user's browsing habits, intercepts the user's personal data, etc., transmitting this information to a third party
  22. 39. the correct or acceptable way of communicating on the internet.
  23. 41. an icon or figure representing a particular person in video games, internet forums, etc.
Down
  1. 1. a dishonest scheme; a fraud.: "an insurance scam".
  2. 2. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
  3. 4. false news stories, often of a sensational nature, created to be widely shared or distributed for the purpose of generating revenue, or promoting or discrediting a public figure, political movement, company, etc
  4. 7. the address of a web page.
  5. 11. an application, especially as downloaded by a user to a mobile device.
  6. 13. one's unique set of digital activities, actions, and communications that leave a data trace on the internet or on a computer or other digital device and can identify the particular user or device
  7. 14. tools, machinery, and other durable equipment.
  8. 15. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  9. 18. the practice of taking someone else's work or ideas and passing them off as one's own
  10. 19. the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from computer users for purposes of identity theft
  11. 23. to bully online by sending or posting mean, hurtful, or intimidating messages, usually anonymously
  12. 26. the quality of being trusted and believed in.
  13. 27. a person who uses computers to gain unauthorized access to data.
  14. 30. a set of related web pages located under a single domain name, typically produced by a single person or organization.
  15. 31. a packet of data sent by a web server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.
  16. 32. copy (data) from one computer system to another, typically over the internet.
  17. 33. a secret word or phrase that must be used to gain admission to something
  18. 35. the fraudulent appropriation and use of someone's identifying or personal data or documents, as a credit card.
  19. 40. transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.