Digital Tech Final Study

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 1. Universal Serial Bus. an external storgae device.
  2. 3. instructions and programs for the computer.
  3. 8. web-based application where documents and spreadsheets can be created, edited, and stored online.
  4. 9. local area network.
  5. 11. knowing the rights and wrongs of tech and acting accordingly
  6. 14. a site where people can add and update content using their own web browser.
  7. 15. the central processing unit, carries out computer instructions.
  8. 17. fraud which acquires personal details by getting them out of phone calls from semmingly real organizations.
  9. 21. privilages, freedoms, and expactations of tech users
  10. 23. legal rights and restrictions governing tech use.
  11. 24. email, storage, and data syncronization subscription service, provides storage for free.
  12. 25. acceptable use policy. written ageement to abide by set technology rules and guidelines.
  13. 26. a file created or saved by an application.
  14. 30. applied science of equipment design, intended to reduce discomfort and fatigue and maximize productivity.
  15. 32. arranging all folders, files, and other documents neatly.
  16. 34. buying and selling of goods online.
  17. 35. elements of physical and psycholoigcal well-being related to tech use.
  18. 38. expanding the number of business and/or social contacts by making connections through individuals.
  19. 39. cloud storage service integrated with Google's other services and systems.
Down
  1. 2. repeatedly sent messages meant to pressure you to do something.
  2. 4. stores groups of files or folders neatly.
  3. 5. an online journal where readers can interact
  4. 6. standards of conduct expected by other tech users.
  5. 7. to steal a work and pass it off as your own.
  6. 10. software that aids in gathering info about a person or organization without their knowledge or consent.
  7. 12. gives holder exclusive rights to a creative work.
  8. 13. the display output device of a computer.
  9. 14. wide area network.
  10. 16. the capability to use tech and knowing when and how to use it.
  11. 18. electronic exchange of information.
  12. 19. physical computer equipment.
  13. 20. full electronic participation in society.
  14. 22. "malicious software". Designed to steal info, inflict damage, commit fraud, and spread spam.
  15. 24. crime in which personal data is obtained in a way that involves deception or fraud, typically for economic gain.
  16. 27. using information tech to harass, threaten, or intimidate.
  17. 28. a file, such as a document, image, or video, that can be shared or put on an email.
  18. 29. precautions users must take to guarantee personal safety and security.
  19. 31. the home screen of a computer, where file shortcuts are accessed.
  20. 33. internet fraud that uses emails and pop-ups to lure victims into providing personal information.
  21. 36. computer networks connected over the internet for redundancy or cluster computing.
  22. 37. a document created by a program.