FINAL REVIEW

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 5. the responsibility of being safe online and following online rules
  2. 7. A program on a computer that allows the user to create, edit, view, print, rename, copy, or delete files, folders, or an entire file system
  3. 8. is internet fraud in the form of emails or pop-ups to lure users into providing usernames, and passwords
  4. 9. servers that are accessed over the Internet, and the software and databases that run on those servers
  5. 11. the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself
  6. 13. An app which allows you to create letters, documents, stories, similar to Microsoft Word
  7. 15. document created by programs which makes up for operating systems
  8. 17. a device that is used for showing, watching, or listening to something on computer
  9. 19. the precautions that all technology users must take to guarantee their personal safety and the security of their network
  10. 22. web site allows user to add content using their won web
  11. 26. is short for malicious software and is designed to steal info, inflict damage upon your computer, commit fraud, and spread spam
  12. 27. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
  13. 28. A single place to store, access, create, edit, and share documents, files, and folders of all types
  14. 30. a person who develops the skills and knowledge to effectively use the internet and digital technologies
  15. 31. Universal Serial Bus. A type of connection used to attach devices such as flash drives, scanners, cameras, and printers to a computer
  16. 32. online journals create interaction from readers
  17. 33. wide area network
  18. 34. files embedded within online communication channels such as emails, instant messages, or social networks
  19. 35. unsolicited, unwanted commercial email messages
  20. 37. exclusive right to sell, publish, or reproduce creative works for a specified number of years
  21. 38. The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently
  22. 39. physical equipment that makes up computer system
Down
  1. 1. A crime that involves someone pretending to be another person in order to steal money or obtain benefits
  2. 2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
  3. 3. a personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table
  4. 4. the buying and selling of goods online
  5. 6. the priviledges and freedoms extended to all digital technology users and the behavioral expectations that come with them
  6. 10. obtain financial info from people that seem to be from legitimate organizations by phone calls
  7. 12. the ability to fully participate in digital society
  8. 14. instructions/programs that tell the computer what to do
  9. 16. involves an organization's online communication efforts
  10. 18. acceptable use policy
  11. 19. a written or printed record that gives information or proof
  12. 20. the electronic standards of conduct or procedure
  13. 21. stores groups of files in organized fashion
  14. 23. local area network
  15. 24. Apple's version of cloud storage
  16. 25. the capability to use digital technology and knowing when and how to use it
  17. 29. central processing unit
  18. 36. taking ideas or other forms of intellectual effort and passing them off as one's own