digatle lab

12345678910111213141516171819202122232425262728
Across
  1. 2. Addiction Use the built-in screen time features on your devices, or apps like Forest, to set limits and track your usage.
  2. 5. is false information that is deliberately and intentionally spread to deceive, mislead, and manipulate people.
  3. 8. the practice of protecting systems, networks, and data from digital attacks to prevent theft
  4. 9. Commons a nonprofit organization that provides free, easy-to-use legal tools for creators to grant the public permission to use their work under copyright law
  5. 12. the act of taking another person's words, ideas, or work and presenting them as your own without proper acknowledgment
  6. 13. the code of conduct for respectful and appropriate online behavior
  7. 16. a person who witnesses injustice or harm and chooses to intervene to make things right
  8. 18. the philosophical study of morality, concerned with what people ought to do, what is right and wrong, and how to live a good life
  9. 19. a type of cyberattack that uses deceptive emails, texts, or websites to trick people into revealing sensitive information like passwords
  10. 20. the use of digital devices and technology—such as cell phones, computers, and tablets—to harass, threaten, or humiliate another person
  11. 23. In the context of digital technology, piracy is the illegal act of copying, distributing, or using copyrighted material without the creator's permission.
  12. 24. An algorithm is a set of precise, step-by-step instructions for solving a problem or performing a task.
  13. 25. the trail of data left behind from a user's online activity, including their browsing history, social media posts, and online purchases
  14. 27. a person who sees or knows about bullying or other harmful behavior happening to someone else, but is not directly involved.
  15. 28. Time the amount of time a person spends using electronic devices with a display screen,
Down
  1. 1. personal information is any data that can identify a specific person, including both direct identifiers like a name or Social Security number, and indirect identifiers like a unique IP address or location data.
  2. 3. Intelligence a field of computer science that focuses on creating machines capable of performing tasks that typically require human intelligence
  3. 4. is false or inaccurate information that is spread without the intent to deceive.
  4. 6. Use The practice of being intentional and consciously aware of how, when, and why you use digital technology is known as
  5. 7. someone who makes responsible, safe, and ethical choices when using technology and the internet.
  6. 10. Reality a technology that overlays digital information—such as computer-generated images, text, and 3D models—onto the real world
  7. 11. the collection of information that uniquely identifies a person, organization, or device on the internet
  8. 14. the process of converting data into a secret code to prevent unauthorized access, using algorithms and a "key" to scramble and unscramble it
  9. 15. access, analyze, evaluate, and create all forms of communication to understand their influence on thoughts, feelings, and behaviorsl
  10. 17. control how much personal information you share on devices, apps, and websites by managing data collection
  11. 21. a type of intellectual property law that grants the creator of an original work exclusive rights to its use and distribution for a limited time
  12. 22. Balance the ability to use digital technology and online platforms in a way that is healthy, intentional, and does not interfere with a person's physical, mental, or emotional well-being
  13. 26. Use a legal doctrine that allows for the unlicensed use of copyright-protected works in specific circumstances without infringing upon the owner's rights