Unit 1: Safety and Orientation

123456789101112131415161718
Across
  1. 2. Any internet-related illegal activity.
  2. 4. as adult online users who seek to exploit vulnerable children or adolescents for sexual or other abusive purposes.
  3. 5. intentionally harmful; spiteful
  4. 7. A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer.
  5. 9. Any technique, software, etc., used to protect computers and prevent online crime.
  6. 10. a machine that consist of a lever and a plate that uses a metal die with sharp edges to press into paper therefore cutting the paper into the shape of the die
  7. 14. requires public schools and libraries receiving federal e-rate funds to use a portion of those funds to filter their internet access.
  8. 16. Methods individuals use to track, lure, or harass another person online.
  9. 18. information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
Down
  1. 1. is federal legislation in the United States that protects the privacy of students' personally identifiable information (PII). The act applies to all educational institutions that receive federal funds.
  2. 3. a machine that uses heated rollers to melt plastic onto paper for durability
  3. 6. computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
  4. 8. Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites)
  5. 11. is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.
  6. 12. Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
  7. 13. A scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
  8. 15. Refers to virtual sexual encounters between two or more persons.
  9. 17. the fact or condition of being affected by something or experiencing something