Digital
Across
- 3. Bullying that takes place over digital devices like cell phones computers and tablets.
- 4. Citizen A person who develops the skills and knowledge to effectively use the internet and other digital technology especially in order to participate responsibly in social and civic activities.
- 7. A type of intellectual property that gives its owner the exclusive right to copy and distribute a creative work usually for a limited time.
- 10. An application especially as downloaded by a user to a mobile device.
- 11. footprint A trail of data you create while using the Internet.
- 14. A global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- 15. A piece of code which is capable of copying itself and typically has a detrimental effect such as corrupting the system or destroying data.
- 17. A self-replicating program able to propagate itself across a network typically having a detrimental effect.
- 18. An icon or figure representing a particular person in video games internet forums etc.
- 19. The programs and other operating information used by a computer.
- 21. A dishonest scheme; a fraud.
- 23. Short for “malicious software” refers to any intrusive software developed by cybercriminals.
- 24. Media Websites and applications that enable users to create and share content or to participate in social networking.
- 26. Someone using your personal information to open accounts file taxes or make purchases.
- 27. A representation of a facial expression such as[:-)] formed by various combinations of keyboard characters and used to convey the writer's feelings or intended tone.
- 30. A string of characters used to verify the identity of a user during the authentication process.
- 34. A type of social engineering where an attacker sends a fraudulent.
- 36. Consists of all the creative work to which no exclusive intellectual property rights apply.
- 38. The physical parts of the computer that you can touch.
- 40. To use the words or ideas of another person as if they were your own words or ideas.
Down
- 1. To copy (data) from one computer system to another typically over the internet.
- 2. The correct or acceptable way of communicating on the internet.
- 5. Horse A type of malicious code or software that looks legitimate but can take control of your computer.
- 6. A network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
- 8. A person who speaks or acts in support of an individual or cause particularly someone who intervenes on behalf of a person being attacked or bullied.
- 9. A doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder.
- 12. An identification used by a person with access to a computer network or online service.
- 13. A person who uses computers to gain unauthorized access to data.
- 16. A person who is present at an event or incident but does not take part.
- 17. A set of related web pages located under a single domain name typically produced by a single person or organization.
- 20. Wide Web An information system on the internet which allows documents to be connected to other documents by hypertext links enabling the user to search for information by moving from one document to another.
- 21. Irrelevant or inappropriate messages sent on the internet to a large number of recipients.
- 22. A packet of data sent by a web server to a browser which is returned by the browser each time it subsequently accesses the same server used to identify the user or track their access to the server.
- 25. A regularly updated website or web page typically one run by an individual or small group that is written in an informal or conversational style.
- 28. A person who makes a deliberately offensive or provocative online post.
- 29. False news stories often of a sensational nature created to be widely shared or distributed for the purpose of generating revenue or promoting or discrediting a public figure political movement company etc.
- 31. Engine A software system that is designed to carry out web searches.
- 32. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 33. The act of posting insults often including profanity or other offensive language.
- 35. One who is habitually cruel insulting or threatening to others who are weaker smaller or in some way vulnerable.
- 37. The quality of being trusted and believed in.
- 39. The address of a web page.