Digital Citizenship

1234567891011121314151617181920
Across
  1. 2. virtual private network
  2. 4. primarily used for educational institutions
  3. 5. When sending personally identifiable information through email, _________ the message
  4. 8. commonly used for commercial purposes but can be used for any type of website
  5. 9. A secret set of characters that are used to access a computer system or service
  6. 11. personally identifiable information
  7. 12. a virus or Trojan horse designed to cause harm to a computer or device
  8. 14. cyberbullying can lead to _____________
  9. 15. google chrome's private browsing window
  10. 17. scanning, a process that uses a person's unique physical characteristics to identify them
  11. 18. used by the US federal government
  12. 19. downloading pirated music is ______________
  13. 20. browsing, does not track or leave any traces of what was browsed
Down
  1. 1. sending, posting, or sharing negative, harmful, false, or mean content about someone else
  2. 3. commonly used for organizations providing networking
  3. 6. ________ ethics a set of moral guidelines that dictate how computers should be used
  4. 7. cyberbullying and harassment are prevalent among teens and ___________
  5. 8. card, is an example of personally identifiable information
  6. 10. Anonymity, the state of being anonymous online
  7. 11. Negative communication includes both words and demeaning __________
  8. 13. used for organizations
  9. 16. a password should have at least __________ characters