Across
- 5. Harassment using electronic technology.
- 7. Appropriate behavior when using technology.
- 9. Record that saves authentication criteria.
- 10. Use of technology to help a person feel as if he or she is present with other people in a meeting at a different location.
- 12. Contains information necessary to ensure proper delivery of messages.
- 13. speaking a false statement about someone that causes others to have a bad opinion of him/her.
- 16. Allows multimedia file to begin playing before it is downloaded.
- 17. Cell phone provider.
- 20. Tools that support creating, sharing, or exchange of information through websites or applications.
- 23. Working together on a project with other people.
- 25. Data record of all your online activities.
- 26. Program used to create and send messages.
- 28. Unsolicited email messages.
Down
- 1. Online identity of the account holder.
- 2. Publishing false statement about someone that causes others to have a bad opinion of him/her.
- 3. Platform for discussions and asking/responding to questions.
- 4. Conducting a meeting with audio and visual interaction between people if different locations.
- 6. Posting in a negative or ill mannered way.
- 8. How you represent yourself through internet based media.
- 11. Technology based on wireless transmission over geographic areas.
- 14. Unwanted email sent to large number of users.
- 15. Contains email addresses of contacts.
- 18. Hard-wired phone.
- 19. How other users see your availability for immediate interaction.
- 21. Storing email messages where they don't load, but can be retrieved.
- 22. Named collection of email addresses.
- 24. Allows people to express opinions on topics they are interested in.
- 27. Area where signal from a tower is carried.
