DC2
Across
- 2. Deceptive attempts to obtain sensitive information, often through fraudulent emails or websites
- 4. A trail of online activities and interactions
- 5. Being accountable for one's actions
- 8. The unauthorized use of someone's personal information
- 10. Serving a useful and positive purpose.
- 13. Data that is private and should be protected from misuse.
- 15. Treating others with kindness and consideration.
- 17. The interconnected space created by the use of technology
- 18. Virtual limits or restrictions
Down
- 1. A group of people who interact and share common interests
- 3. Secure combinations of characters used to protect online accounts.
- 6. Online etiquette or good manners
- 7. The responsible and respectful use of technology
- 9. Details about an individual that can be used to identify them.
- 11. The results or effects that follow a particular action.
- 12. Controls on social media and online platforms that dictate who can access specific information
- 14. Practices and precautions to protect oneself from potential risks
- 16. To work together with others