Web Ethics & Safety
Across
- 3. use Uppercase, numbers, special characters !Fo0+/8@1L
- 5. a worldwide system of computer networks.
- 9. think before you
- 10. two or more computers that are linked in order to share resources, such as printers, exchange files, or allow electronic communications.
- 11. computer device which forwards data packets from one network to another; the dock.
- 15. ownership of any creative work or invention
- 17. monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
- 19. an exclusive right granted for an invention
- 20. security component which encrypts data and keeps it private within a public
- 22. granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production
- 23. exception to copyright infringement: allows for educators to use part of someone's work
Down
- 1. use of other people’s words, thoughts or ideas without crediting the source.
- 2. crime which occurs when someone’s personal and financial information is stolen
- 4. a method of prevention to avoid computer viruses.
- 6. don't be a bystander, be a
- 7. computer program which replicates and spreads itself from one computer to another
- 8. method through which hackers can gain access to a computer; usually through email scams
- 9. adult Internet user who uses social networking sites, chat rooms or other cyberspace to approach and eventually hurt other people, usually for sexual or abusive purposes.
- 12. network controller which connects network devices and allows effective communication between these devices; the traffic light.
- 13. device 95% of cyberbullies use to cyberbully others
- 14. unauthorized reproduction or distribution of copyrighted materials
- 16. creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic device
- 18. use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
- 21. originally refers to someone who is an expert at computer programming, but also means someone who illegally gains access to others’ computer for their own profits