Intro to Computer Science

12345678910111213141516171819
Across
  1. 4. Impersonating or highly exaggerating online identities
  2. 5. the practice of bullying a person by sending messages or posting social media content of an intimidating, mocking, or threatening nature.
  3. 7. Hardware + Software
  4. 9. a method to gather personal information such as usernames and passwords using deceptive emails and websites
  5. 11. A free, web-based word processor that allows users to create, edit, and collaborate on documents online
  6. 13. Horizontal sections of a spreadsheet, identified by numbers (1, 2, 3, etc.)
  7. 14. greatly surprised, astonished
  8. 15. Whenever something is free (for example an app), you are the ______________
  9. 17. _____________ Safety is being aware of all the possible threats that you could encounter while being on the internet
  10. 18. A Type of Computer
  11. 19. someone who sees bullying happening but does not do anything to stop it
Down
  1. 1. The individual boxes formed by the intersection of a row and a column, which hold your data
  2. 2. is a type of security Attack
  3. 3. A type of Computer
  4. 5. Vertical sections of a spreadsheet, identified by letters (A, B, C, etc.)
  5. 6. a free email service from Google that lets you send and receive emails, with extra features
  6. 8. someone who does their best to support and protect their peers
  7. 10. Pestering, Annoying, humiliating, initimidating someone
  8. 12. _____________ Theft is a type of security Attack
  9. 16. a free, web-based program where you can create and edit spreadsheets, similar to a digital ledger, to organize, analyze, and visualize data