Across
- 3. Using someone else’s work and claiming it is your own
- 10. A type of online threat where a fake website is used to try and trick people into providing personal information.
- 14. Settings on social media that limit who can see your online activity.
- 15. The right to be free of undue intrusion.
- 18. Computer programs designed to protect your computer from online threats, like viruses and other malicious software.
- 19. An illegal use of copyrighted material.
- 20. Original work that is not protected by copyright and is free to use without permission is known to be in this.
Down
- 1. A type of malware that is spread through human interaction, usually by clicking on an infected attachment, download, or link.
- 2. A setting online or on social media that prevents another user from seeing your profile or contacting you in any way.
- 4. An online community of people with like interests
- 5. The exclusive right to make copies. This automatically applies to original work.
- 6. Formal ways to give credit to an original creator or author.
- 7. These are guidelines for using copyright-protected work in a specific way and for a specific purpose, like a school project, to avoid copyright infringement.
- 8. Malicious Software.
- 9. A permanent record of all of your online activity.
- 11. A detailed report on someone’s actions and behaviors
- 12. A type of online threat where a fake email is used to try and trick people into clicking and providing personal information.
- 13. A type of malware that is difficult to detect and secretly watches what you do online. Some versions can copy your keystrokes.
- 16. A type of malware that looks like a trustworthy file or program but isn’t. Insidious malware.
- 17. A type of malware that self-replicates and spreads without human interaction. Can use up all of your RAM and make your computer freeze and become unusable.