Digital Citizenship Vocabulary
Across
- 3. a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- 8. false or inaccurate information
- 9. the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility
- 10. user-controlled options in software, apps, and social networks that manage how personal data is shared, stored, and accessed
- 11. a branch of computer science that develops systems capable of performing tasks requiring human-like intelligence, such as learning, reasoning, problem-solving, perception, and decision-making
- 12. a U.S. legal doctrine permitting limited, unlicensed use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research
- 16. the unique, often permanent, trail of data you leave behind while using the internet
- 18. the moral principles that govern how individuals and organizations operate
- 20. the ability to understand and share the feelings of another.
- 22. the unauthorized use or reproduction of another's work.
- 23. time spent using a device such as a computer, television, or games console.
- 24. a technology that overlays digital information—such as 3D models, images, or data—onto the real world in real-time, typically using smartphone cameras, tablets, or smart glasses
- 25. any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
- 26. a behavioral disorder characterized by compulsive, excessive use of digital devices (smartphones, social media, gaming) that interferes with daily life, relationships, and responsibilities.
- 28. the practice of taking someone else's work or ideas and passing them off as one's own.
- 30. false, inaccurate, or misleading information deliberately created and spread to deceive, manipulate, or harm, rather than to inform
Down
- 1. the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage
- 2. the process of converting readable information (plaintext) into an unreadable, scrambled format (ciphertext) using an algorithm and a cryptographic key
- 4. a form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or phone to steal sensitive information like passwords, credit card numbers, or login credentials
- 5. a person who is present at an event or incident but does not take part.
- 6. the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet
- 7. the established standards of respectful, polite, and responsible behavior in online environments
- 13. a precise, step-by-step set of instructions or rules followed to solve a specific problem or accomplish a task
- 14. the ethical, safe, and accountable use of technology, focusing on managing one's digital footprint, respecting others' privacy, and ensuring secure online interactions
- 15. the responsible, ethical, and safe use of technology, the internet, and digital devices
- 17. a non-profit organization providing free, standardized, legal licenses that allow creators to share their work while retaining copyright
- 19. a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—the moment they are fixed in a tangible medium
- 21. the use of digital devices (phones, computers, social media, gaming) to intentionally and repeatedly harass, threaten, humiliate, or target someone
- 27. maintaining a healthy, intentional, and responsible relationship with technology, ensuring screen time does not negatively impact physical, mental, or social well-being
- 29. the practice of engaging with technology, resources, or daily activities with conscious intention, awareness, and purpose, rather than acting on autopilot