Ch 15 Review

12345678910111213141516171819202122232425262728
Across
  1. 5. Harassment using electronic technology.
  2. 7. Appropriate behavior when using technology.
  3. 9. Record that saves authentication criteria.
  4. 10. Use of technology to help a person feel as if he or she is present with other people in a meeting at a different location.
  5. 12. Contains information necessary to ensure proper delivery of messages.
  6. 13. speaking a false statement about someone that causes others to have a bad opinion of him/her.
  7. 16. Allows multimedia file to begin playing before it is downloaded.
  8. 17. Cell phone provider.
  9. 20. Tools that support creating, sharing, or exchange of information through websites or applications.
  10. 23. Working together on a project with other people.
  11. 25. Data record of all your online activities.
  12. 26. Program used to create and send messages.
  13. 28. Unsolicited email messages.
Down
  1. 1. Online identity of the account holder.
  2. 2. Publishing false statement about someone that causes others to have a bad opinion of him/her.
  3. 3. Platform for discussions and asking/responding to questions.
  4. 4. Conducting a meeting with audio and visual interaction between people if different locations.
  5. 6. Posting in a negative or ill mannered way.
  6. 8. How you represent yourself through internet based media.
  7. 11. Technology based on wireless transmission over geographic areas.
  8. 14. Unwanted email sent to large number of users.
  9. 15. Contains email addresses of contacts.
  10. 18. Hard-wired phone.
  11. 19. How other users see your availability for immediate interaction.
  12. 21. Storing email messages where they don't load, but can be retrieved.
  13. 22. Named collection of email addresses.
  14. 24. Allows people to express opinions on topics they are interested in.
  15. 27. Area where signal from a tower is carried.