Xavier's crossword puzzle
Across
- 4. Encryption is the process of converting readable information (plaintext) into an unreadable, scrambled format (ciphertext) using an algorithm and a cryptographic key.
- 6. Piracy is the illegal act of robbery, violence, or detention committed at sea by private individuals against another ship.
- 8. is a non-profit organization providing free, standardized, legal licenses that allow creators to share their work while retaining copyright.
- 10. Use Fair use is a U.S. legal doctrine permitting limited, unlicensed use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research.
- 13. a person who uses information technology—such as the internet, social media, and mobile devices
- 14. Technology addiction is a behavioral disorder characterized by compulsive, excessive use of digital devices (smartphones, social media, gaming) that interferes with daily life, relationships, and responsibilities.
- 16. Personal information (PII) is any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
- 18. An algorithm is a precise, step-by-step set of instructions or rules followed to solve a specific problem or accomplish a task, commonly used in computing and mathematics.
- 19. Bystanders are individuals that observe or witness an event or situation they are not directly involved in.
- 21. Digital etiquette (or "netiquette") refers to the established standards of respectful, polite, and responsible behavior in online environments.
- 24. Plagiarism is the act of presenting another person’s words, ideas, images, or creative work as your own, without proper attribution or citation.
- 25. Ethics is the branch of philosophy, often called moral philosophy, that systematically studies, defines, and evaluates principles of right and wrong, good and bad, and justice and injustice.
- 26. Screen time refers to the total time spent in front of screens, including smartphones, tablets, televisions, computers, and video game consoles.
- 28. A digital footprint is the unique, often permanent, trail of data you leave behind while using the internet
- 29. An upstander is someone who witnesses a behavior that could lead to something high risk or harmful, and makes the choice to intervene to make things better.
- 30. A digital balance is a high-precision, electronic instrument designed to measure the mass or weight of an object, providing quick and accurate readings on a digital screen, often down to the milligram level.
Down
- 1. wrongly or badly informed
- 2. Artificial intelligence (AI) is a branch of computer science that develops systems capable of performing tasks requiring human-like intelligence, such as learning, reasoning, problem-solving, perception, and decision-making.
- 3. Cybersecurity is the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage.
- 5. Augmented Reality (AR) is a technology that overlays digital information—such as 3D models, images, or data—onto the real world in real-time, typically using smartphone cameras, tablets, or smart glasses.
- 7. Media literacy is the ability to access, analyze, evaluate, create, and act using all forms of communication. It is a 21st-century approach to education that builds critical thinking skills
- 9. Digital responsibility is the ethical, safe, and accountable use of technology, focusing on managing one's digital footprint, respecting others' privacy, and ensuring secure online interactions.
- 11. Empathy is best described as the ability to understand and share another person's feelings, perspectives, and experiences.
- 12. Privacy settings are tools and configurations on websites, apps, and devices that allow users to control what personal information is shared
- 15. Cyberbullying is the use of digital devices (phones, computers, social media, gaming) to intentionally and repeatedly harass, threaten, humiliate, or target someone.
- 17. Online identity (or digital identity) is the sum of all information, behaviors, and attributes—such as usernames, profiles, search history.
- 20. Mindful use is the intentional, conscious, and non-judgmental engagement with technology, tools, or daily activities, prioritizing awareness over automatic, impulsive habits.
- 22. is a form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or phone to steal sensitive information like passwords
- 23. Disinformation is false, inaccurate, or misleading information deliberately created and spread to deceive, manipulate, or harm, rather than to inform.
- 27. Copyright is a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—the moment they are fixed in a tangible medium.