crossword puzzle
Across
- 2. A form of cyberattack where an attacker uses deceptive emails, messages, or websites to trick individuals into revealing sensitive information like passwords or credit card numbers, often by posing as a trustworthy entity.
- 5. A set of rules or instructions that a computer follows to solve a particular problem or complete a task. In digital media, algorithms are often used to determine what content is displayed to users (e.g., social media feeds or search results).
- 9. Bullying that takes place over digital devices such as cell phones, computers, and tablets. It can occur through social media, text messages, gaming platforms, and other online forums.
- 11. False or inaccurate information that is spread unintentionally. While it is untrue, there is no intent to deceive.
- 12. A nonprofit organization that provides free, standardized copyright licenses that allow creators to specify how others can use their work (e.g., share, reuse, adapt) while still maintaining certain rights and ensuring proper attribution.
- 15. The total amount of time spent using devices with a screen, such as smartphones, tablets, computers, and televisions.
- 20. Use A conscious approach to using technology that involves self-regulation and intentional choices about when, why, and how to use digital devices, rather than using them automatically or compulsively.
- 21. The unauthorized copying, sharing, or use of copyrighted material without permission from the creator or rights holder, which is a violation of copyright law.
- 22. The ethical obligation of users to behave responsibly and thoughtfully while using technology. This encompasses protecting personal information, respecting others, and avoiding harmful online activities.
- 24. False information deliberately and often covertly spread (as by a government, political party, or special interest group) in order to influence public opinion or obscure the truth.
- 25. The ability to understand and share the feelings of another. Online, this means considering the feelings and perspectives of others in digital interactions, which is essential for combating cyberbullying.
- 28. The process of converting information or data into a code to prevent unauthorized access. Encrypted data can only be deciphered using a specific key, ensuring privacy and security during transmission and storage.
- 29. Addiction A problematic use of digital devices and media platforms characterized by a persistent, intense urge to engage in a behavior despite harmful or adverse consequences, such as negative effects on sleep, work, or relationships.
Down
- 1. the trail of data left behind from online activities, including what you intentionally post (active footprint) and the data collected about you without your full awareness (passive footprint)
- 3. a person who uses technology and the internet responsibly and appropriately, demonstrating skills like digital literacy, online safety, and respect for others
- 4. Using digital media in a way that feels healthy and is in proportion with other important life activities, such as family time, hobbies, and sleep.
- 6. Use A legal doctrine that permits limited use of copyrighted material without permission from the rights holder for purposes such as commentary, criticism, news reporting, teaching, scholarship, or research.
- 7. The practice of taking someone else's work or ideas and passing them off as one's own, without attribution or permission.
- 8. Intelligence A set of techniques that enable computer systems to perform tasks that typically require human intelligence, based on input data or training (e.g., speech recognition, problem-solving, chatbots).
- 10. An interactive experience that enhances the real world by overlaying computer-generated images and information onto the user's view of the actual environment, often using a phone app or AR glasses
- 13. The practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
- 14. Data that can be used to identify, contact, or locate a single person, such as name, address, email, phone number, and Social Security Number. Protecting this data is crucial for online safety.
- 16. An individual who witnesses injustice or negative behavior and takes action to intervene, report the behavior, or support the victim.
- 17. the social identity a user establishes online through profiles, usernames, and interactions on websites and social media
- 18. the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility.
- 19. A person who witnesses an event or situation (such as cyberbullying) but does not take action.
- 23. A set of rules outlining acceptable and polite behavior when communicating and interacting online. This includes being respectful, professional, and mindful of others' privacy.
- 26. Settings allow you to control what information you share online by adjusting settings on software, apps, and devices
- 27. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- 28. A set of moral principles that govern an individual's or group's behavior, particularly in the context of technology regarding issues like data collection, AI development, and virtual harms.