AES Digital Citizenship (Russell)

123456789101112131415161718192021222324252627282930
Across
  1. 4. is the stealing of someone else’s words or ideas and presenting them as your own
  2. 6. is the stealing of copyrighted work by downloading or copying it in order to keep, sell or give away without permission and without paying
  3. 7. an economic inequality between groups, broadly construed, in terms of access to, use of, or knowledge of information and communication technologies
  4. 9. represents works whose intellectual property rights have expired or works that have been released by the creator
  5. 11. gives the creator of an original work exclusive right to that work, usually for a limited time
  6. 14. the works, inventions or creations of an individual, group or business
  7. 16. does not give someone the right to bully or harass someone else.
  8. 20. Attribution is a public copyright license that enables free distribution of copyrighted work WITH the proper credit to the creator.
  9. 21. thief uses identity to gain medical treatment or commit insurance fraud.
  10. 23. use upper and lower case letters, numbers and symbols. (8 or more characters)
  11. 24. spread from one machine to another, rapidly, without human action.
  12. 26. a person who has been exposed to technology from a young age and is pretty comfortable using it
  13. 28. if the network is _______________, that means the data sent back and forth between your device and wireless router can be viewed by others.
  14. 29. is an agreement between you and the owner of a software program that allows you to perform certain tasks with the software
  15. 30. is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as worms and viruses.
Down
  1. 1. thief spends another person’s money or opens a line of credit in their name.
  2. 2. thief uses someone else’s identity to commit a crime.
  3. 3. digital divide between countries
  4. 5. is when someone wrongfully obtains and uses another person’s personal data, typically for economic gain
  5. 7. are what create a digital footprint
  6. 8. attaches itself to a file or program, enabling it to spread from one computer to another.
  7. 10. is software that has malicious intent.
  8. 12. Once information is added to a digital footprint, it may remain there ____________.
  9. 13. thief uses SSN to file taxes or reap other governmental benefits
  10. 15. the use of Information Technology to harm or harass other people in a deliberate, repeated, and hostile manner
  11. 17. All of the information online about a person either posted by that person or others, intentionally or unintentionally.
  12. 18. is the act of cracking into a computer to steal information.
  13. 19. textual content, images, and multimedia that the creator must have the right to use.
  14. 22. any program used by a computer
  15. 25. The “___________” rule of copyright law explains when free use of copyrighted material is acceptable. This rule applies to any and all copyrighted works.
  16. 27. The primary goal of an ______________ is to trick someone into giving money or sharing information.