Intro to Computer Science
Across
- 4. Impersonating or highly exaggerating online identities
- 5. the practice of bullying a person by sending messages or posting social media content of an intimidating, mocking, or threatening nature.
- 7. Hardware + Software
- 9. a method to gather personal information such as usernames and passwords using deceptive emails and websites
- 11. A free, web-based word processor that allows users to create, edit, and collaborate on documents online
- 13. Horizontal sections of a spreadsheet, identified by numbers (1, 2, 3, etc.)
- 14. greatly surprised, astonished
- 15. Whenever something is free (for example an app), you are the ______________
- 17. _____________ Safety is being aware of all the possible threats that you could encounter while being on the internet
- 18. A Type of Computer
- 19. someone who sees bullying happening but does not do anything to stop it
Down
- 1. The individual boxes formed by the intersection of a row and a column, which hold your data
- 2. is a type of security Attack
- 3. A type of Computer
- 5. Vertical sections of a spreadsheet, identified by letters (A, B, C, etc.)
- 6. a free email service from Google that lets you send and receive emails, with extra features
- 8. someone who does their best to support and protect their peers
- 10. Pestering, Annoying, humiliating, initimidating someone
- 12. _____________ Theft is a type of security Attack
- 16. a free, web-based program where you can create and edit spreadsheets, similar to a digital ledger, to organize, analyze, and visualize data