Across
- 2. Using someone else's work and passing it off as your own
- 5. Sexting is _______ for all individuals who send or receive sexually suggestive images under the age of 18 years old
- 6. people that stand up for others
- 8. Never list your ________ number or home address under contact information onlin.
- 13. Your digital _______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- 14. The ability to act in a safe and responsible way on the internet and other connected environments
- 17. A detailed report, usually about a person
- 18. Rules for interacting politely and responsibly online
- 20. Formal ways of giving credit to others for their work
- 23. Someone who intentionally targets people for harm using online chat rooms or social media
- 25. passwords that contain easy-to-guess information
- 26. programs or code that damage or destroy data by attaching to a program or file in a victim computer
- 28. Phishing is malware that asks for personal _______.
- 31. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs
- 32. ______ settings help control things like your Profile, Contact, and other Information relating to your account
- 33. Many features in online ________ can expose players to predators
Down
- 1. public _______ applies to works that are not copyrighted or have lost their copyright status due to age
- 3. Secretly watches computer activity
- 4. Any program, website, or file that is designed to damage or gain unauthorized access to a device
- 7. Software that protects computers from virus related harm
- 8. When entering _______ information, be careful not to reveal personal details like you birthday or home address
- 9. The exclusive right to make copies, license, or otherwise use a creative work
- 10. Information about you and what you do online
- 11. The format most commonly used for citing sources in language, literature, and in K-12
- 12. A _______ password is one that contains at least 10 characters and several unique characters.
- 15. ____ use allows limited use of copyrighted material for educational purposes
- 16. Illegal ____ of copyrighted material is often referred to as piracy
- 19. Programs that appear to be useful but damage computers
- 20. Bullying that takes place online
- 21. are used in conjunction with a screen name to help identify an online user without giving away personal details
- 22. Your _______ device often contains more personal information that any other source
- 24. You do not need to _________ for a copyright, it is automatic
- 25. special viruses that move from computer to computer without human action
- 27. when online, using a _____ name helps protect your true identity
- 29. Social _____ is a site or online community where people with like experiences or interests communicated with each other.
- 30. URLS that lead the user to download a virus or visit a harmful website
- 34. The format that is most commonly used in education and social sciences