Digital Citizenship Terms

1234567891011121314151617181920212223
Across
  1. 3. Packet of data sent from a server to a personal computer, returned by the browser when the user of the personal computer accesses said server.
  2. 6. Representation of a face formed by multiple characters such as “:” and “)”, forming to make “:)”, or “☺”. Helps bring tone into digital text messages.
  3. 13. Footprint: Used to describe traces or trail that is left by users online. Includes profiles, pictures, etc.
  4. 14. Property: Work resulted from creativity that one can apply for a copyright, trademark, patent, etc. with.
  5. 17. Someone or something that viciously exploits others.
  6. 19. Intending to harm.
  7. 20. Software allowing a user to convert and transfer data from another computer.
  8. 22. Icon representing a user on a computer, commonly found on Internet forums, video games, and instant messaging platforms.
  9. 23. Commons: A license built on copyrights, allowing others to copy, distribute, and make use of copyrights in their own work, non-commercially. Ensures the original creator gets credit for their work.
Down
  1. 1. Stealing an online account or financial information by posing as legitimate companies.
  2. 2. irrelevant messages sent on the internet to many recipients.
  3. 4. The exclusive legal right to print, publish, etc. materials.
  4. 5. Someone who has committed a crime or something malicious.
  5. 7. Source: Software in which the source code is made public to be redistributed and modified by other users.
  6. 8. A part of a computer used to block unauthorized access, while keeping communication outwards open.
  7. 9. A person not taking part in an event, but present at the event.
  8. 10. Software: Computer software used to prevent, find, and destroy harmful software.
  9. 11. Use: Allowing certain usage of copyrights w/o the need of permission or payment to a copyright holder. Only under certain circumstances.
  10. 12. To abuse someone via a message on the internet.
  11. 15. To make deliberate offensive posts online aimed to upset other users.
  12. 16. Software designed to harm and damage a computer or multiple computers.
  13. 18. Horse: Program posing as non-harmful software that is able to breach the security of a computer.
  14. 21. Ability to understand the feelings of someone else, and to share those feelings.