DC2

123456789101112131415161718
Across
  1. 2. Deceptive attempts to obtain sensitive information, often through fraudulent emails or websites
  2. 4. A trail of online activities and interactions
  3. 5. Being accountable for one's actions
  4. 8. The unauthorized use of someone's personal information
  5. 10. Serving a useful and positive purpose.
  6. 13. Data that is private and should be protected from misuse.
  7. 15. Treating others with kindness and consideration.
  8. 17. The interconnected space created by the use of technology
  9. 18. Virtual limits or restrictions
Down
  1. 1. A group of people who interact and share common interests
  2. 3. Secure combinations of characters used to protect online accounts.
  3. 6. Online etiquette or good manners
  4. 7. The responsible and respectful use of technology
  5. 9. Details about an individual that can be used to identify them.
  6. 11. The results or effects that follow a particular action.
  7. 12. Controls on social media and online platforms that dictate who can access specific information
  8. 14. Practices and precautions to protect oneself from potential risks
  9. 16. To work together with others