Communication and Technology

12345678910111213141516171819
Across
  1. 3. Technology has enabled us to communicate with people around the world with greater ease
  2. 5. A digital technology that allows the sharing of ideas and information,
  3. 6. Through instant messaging platforms, emails, and videoconferencing tools, teams can complete projects faster and more efficiently.
  4. 7. Imposter new sites
  5. 8. any materials, documents, images, videos, recordings or other information that is posted, distributed, created, shared, or transmitted using social media sites
  6. 10. False information that’s created and shared to deliberately cause harm.
  7. 15. the application of scientific knowledge to the practical aims of human life or, as it is sometimes phrased, to the change and manipulation of the human environment.
  8. 16. broadest sense describes "particular ways of thinking about and doing reading and writing" with the purpose of understanding or expressing thoughts or ideas in written form
  9. 18. In communication, media are the communication outlets or tools used to store and deliver content.
  10. 19. News or stories on the internet that are not true. They may be in the form of disinformation or misinformation
Down
  1. 1. Web conference, Vlogs, and Television
  2. 2. show proper netiquette
  3. 4. Technology has made communication more accessible to people with disabilities or those who are unable to travel to physical l
  4. 5. Technology can help to protect sensitive data and communications from being intercepted or stolen.
  5. 9. An abbreviation of Internet etiquette or network etiquette
  6. 11. Technology has allowed us to communicate instantly and with greater accuracy.
  7. 12. a person skilled in information technology who achieves goals by non-standard means.
  8. 13. most viewed social media platform in the Philippines
  9. 14. Technology has enabled teams to collaborate more efficiently and effectively on Projects.
  10. 17. a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware