Across
- 8. Details about an individual that can be used to identify them.
- 9. good manners when using the internet.
- 10. The responsible/respectful use of technology
- 12. Being accountable for your actions and making wise choices.
- 13. Data that is private and should be protected from misuse.
- 15. The results or effects that follow a particular action.
- 16. deceptive attempts to obtain sensitive information, often through fraudulent emails or websites.
- 18. trail of online activities/interactions that shows a person's presence online.
Down
- 1. A group of people who interact & share common interests online.
- 2. unauthorized use of someone's personal information to commit crimes.
- 3. Controls on social media and online platforms that dictate who can access specific information.
- 4. Treating others with kindness and consideration.
- 5. Virtual limits/restrictions on the access/sharing of personal information.
- 6. precautions to protect oneself from potential risks/dangers online.
- 7. To work with others towards a common goal.
- 11. Serving a useful and positive purpose.
- 14. Secure combinations of characters used to protect online accounts.
- 17. The interconnected space created by the use of technology.
