Across
- 2. virtual private network
- 4. primarily used for educational institutions
- 5. When sending personally identifiable information through email, _________ the message
- 8. commonly used for commercial purposes but can be used for any type of website
- 9. A secret set of characters that are used to access a computer system or service
- 11. personally identifiable information
- 12. a virus or Trojan horse designed to cause harm to a computer or device
- 14. cyberbullying can lead to _____________
- 15. google chrome's private browsing window
- 17. scanning, a process that uses a person's unique physical characteristics to identify them
- 18. used by the US federal government
- 19. downloading pirated music is ______________
- 20. browsing, does not track or leave any traces of what was browsed
Down
- 1. sending, posting, or sharing negative, harmful, false, or mean content about someone else
- 3. commonly used for organizations providing networking
- 6. ________ ethics a set of moral guidelines that dictate how computers should be used
- 7. cyberbullying and harassment are prevalent among teens and ___________
- 8. card, is an example of personally identifiable information
- 10. Anonymity, the state of being anonymous online
- 11. Negative communication includes both words and demeaning __________
- 13. used for organizations
- 16. a password should have at least __________ characters
