Digital Citizenship Assessment
Across
- 3. the status of a literary work or an invention whose copyright or patent has expired or that never had such protection.
- 4. a set of related web pages located under a single domain name, typically produced by a single person or organization.: "for more information, please visit our website".
- 6. a person who makes a deliberately offensive or provocative online post.
- 7. A person who is present at an event or incident but does not take part.: "water cannons were turned on marchers and innocent bystanders alike".
- 11. a manifestation of a deity or released soul in bodily form on earth; an incarnate divine teacher.
- 14. reasonable and limited use of copyrighted material so as not to infringe upon copyright:
- 15. a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.: "encourage your daughter to be an upstander, not a bystander".
- 19. an identification used by a person with access to a computer, network,or online service.
- 20. the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from computer users for purposes of identity theft
- 23. on finding and removing viruses, spyw
- 24. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.: works granted such right by law on or after January 1, 1978, are protected for the lifetime of the author or creator and for a period of 70 years after his or her death.
- 26. a representation of a facial expression such as:-) (representing a smile), formed by various combinations of keyboard characters and used to convey the writer's feelings or intended tone.: "flag your jokes with emoticons, such as a smiley face :-), to avoid misunderstandings".
- 27. the practice of taking someone else's work or ideas and passing them off as one's own.: "there were accusations of plagiarism" "it claims there are similar plagiarisms in the software produced at the university".
- 29. a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
- 31. a packet of data sent by a web server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.
- 33. a person who develops the skills and knowledge to effectively use the internet and other digital technology, especially in order to participate responsibly in social and civic activities:
- 34. tools, machinery, and other durable equipment.: "tanks and other military hardware".
- 37. false news stories, often of a sensational nature, created to be widely shared or distributed for the purpose of generating revenue, or promoting or discrediting a public figure, political movement, company, etc.
- 38. The address of a web page.: "type a URL into a browser's address bar" "the URLs for a wide variety of arts-related charities".
- 39. burning fiercely and emitting flames.: "they dragged her away from the flaming car".
- 41. Transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.: "you can upload your prepared text" "software is uploaded and downloaded".
- 42. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.: "the guide is also available on the internet" "internet access" "an internet connection".
- 43. software intended to damage a computer, mobile device, computer system, or computer network, or to take partial control over its operation:
Down
- 1. the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- 2. footprint one's unique set of digital activities, actions, and communications that leave a data trace on the internet or on a computer or other digital device and can identify the particular user or device:Our online browsing habits are part of our passive digital footprint, created without our consent or knowledge, but our active digital footprint, especially on social media, can more easily be managed.
- 5. media websites and applications that enable users to create and share content or to participate in social networking
- 8. Computers. software that is installed surreptitiously and gathers information about an internet user's browsing habits, intercepts the user's personal data, etc., transmitting this information to a third party:
- 9. A secret word or expression used by authorized persons to prove their right to access, information, etc.
- 10. a self-replicating program able to propagate itself across a network, typically having a detrimental effect
- 12. an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.: "a virus infection"
- 13. a person who uses computers to gain unauthorized access to data
- 16. irrelevant or inappropriate messages sent on the internet to a large number of recipients
- 17. wide web an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
- 18. a computer program that searches documents, especially on the World Wide Web, for a specified word or words and provides a list of documents in which they are found.
- 21. the correct or acceptabe way of communicating on the internet.
- 22. a dishonest scheme; a fraud.: "an insurance scam".
- 25. to bully online by sending or posting mean, hurtful, or intimidating messages, usually anonymously:
- 28. the programs and other operating information used by computer.: "the software industry"
- 30. a blustering, mean, or predatory person who, from a perceived position of relative power, intimidates, abuses, harasses, or coerces people, especially those considered unlikely to defend themselves:
- 31. the quality of being trusted and believed in.: "the very public loss of credibility led to the demise of the magazine as a prestigious publication".
- 32. Digital Technology. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
- 35. copy (data) from one computer system to another, typically over the internet.: "it would be wise to download your program to another computer before testing it".
- 36. Malware disguised as legitimate software.
- 40. An application, especially as downloaded by a user to a mobile device.: "I've just installed the app on my phone".