Across
- 2. Addiction Use the built-in screen time features on your devices, or apps like Forest, to set limits and track your usage.
- 5. is false information that is deliberately and intentionally spread to deceive, mislead, and manipulate people.
- 8. the practice of protecting systems, networks, and data from digital attacks to prevent theft
- 9. Commons a nonprofit organization that provides free, easy-to-use legal tools for creators to grant the public permission to use their work under copyright law
- 12. the act of taking another person's words, ideas, or work and presenting them as your own without proper acknowledgment
- 13. the code of conduct for respectful and appropriate online behavior
- 16. a person who witnesses injustice or harm and chooses to intervene to make things right
- 18. the philosophical study of morality, concerned with what people ought to do, what is right and wrong, and how to live a good life
- 19. a type of cyberattack that uses deceptive emails, texts, or websites to trick people into revealing sensitive information like passwords
- 20. the use of digital devices and technology—such as cell phones, computers, and tablets—to harass, threaten, or humiliate another person
- 23. In the context of digital technology, piracy is the illegal act of copying, distributing, or using copyrighted material without the creator's permission.
- 24. An algorithm is a set of precise, step-by-step instructions for solving a problem or performing a task.
- 25. the trail of data left behind from a user's online activity, including their browsing history, social media posts, and online purchases
- 27. a person who sees or knows about bullying or other harmful behavior happening to someone else, but is not directly involved.
- 28. Time the amount of time a person spends using electronic devices with a display screen,
Down
- 1. personal information is any data that can identify a specific person, including both direct identifiers like a name or Social Security number, and indirect identifiers like a unique IP address or location data.
- 3. Intelligence a field of computer science that focuses on creating machines capable of performing tasks that typically require human intelligence
- 4. is false or inaccurate information that is spread without the intent to deceive.
- 6. Use The practice of being intentional and consciously aware of how, when, and why you use digital technology is known as
- 7. someone who makes responsible, safe, and ethical choices when using technology and the internet.
- 10. Reality a technology that overlays digital information—such as computer-generated images, text, and 3D models—onto the real world
- 11. the collection of information that uniquely identifies a person, organization, or device on the internet
- 14. the process of converting data into a secret code to prevent unauthorized access, using algorithms and a "key" to scramble and unscramble it
- 15. access, analyze, evaluate, and create all forms of communication to understand their influence on thoughts, feelings, and behaviorsl
- 17. control how much personal information you share on devices, apps, and websites by managing data collection
- 21. a type of intellectual property law that grants the creator of an original work exclusive rights to its use and distribution for a limited time
- 22. Balance the ability to use digital technology and online platforms in a way that is healthy, intentional, and does not interfere with a person's physical, mental, or emotional well-being
- 26. Use a legal doctrine that allows for the unlicensed use of copyright-protected works in specific circumstances without infringing upon the owner's rights
