Across
- 2. ,information resources
- 5. ,to expose,to harm and to loss
- 8. ,on-scree work area
- 12. ,accessible by a computer
- 14. ,to copy a file, e-mail, or other information from one's personal computer
- 15. ,describes all channels of communication
- 17. ,being groomed, forced or coerced into doing something
- 18. ,a category of cybersecurity risks that may cause an undesirable event or action via the internet
- 19. ,the use of technology to harass, threaten, embarrass, or target another person
- 20. ,knowledge and ability to use computers and related technology efficiently
- 26. ,the transfering of digital photos online
- 27. ,facts provided or learned about
- 29. ,the practice of taking someone else's work or ideas
- 30. ,a worldwide network of computer networks
- 33. ,relating to the present or recent times.
- 35. ,rules governing socially acceptable behavior
- 37. ,representation of a person's real self ,online
- 38. ,main computer on the network
- 39. ,the ability to effectively analyze information
- 40. ,a collection of World Wide Web pages or files
- 41. ,appropriate ,tailor content to the user's age group
- 42. world ,The virtual environment
- 43. ,a group of computers that connected to shares resources
- 44. ,the hard ware and operating system
- 45. ,a mobile phone that performs many of the functions of a personal computer
Down
- 1. ,application of conceptual knowledge
- 3. ,meaning an item for information
- 4. ,to shut down and restart a computer
- 5. ,a person is ethical, responsible, and culturally aware in their interactions with others.
- 6. ,learning facilitated by technology
- 7. ,a powerful computer that can process large amounts of data
- 9. ,the act of sending sexual text messages
- 10. ,a device that accepts information in digital
- 11. ,a single hypertext file or a page that is part of a Web site
- 13. safety ,being aware of the nature of the possible threats online
- 16. ,a globally connected massive computer network system
- 19. ,used by computers to exchange messages and files with other people in a digital format
- 21. ,most commonly deployed via email phishing attacks, where a victim clicks on a link
- 22. ,small image displayed on the screen
- 23. ,the learned ability to act with determined results
- 24. ,programming that controls computer, video, or electronic hardware
- 25. , a web address of a specific web page or file on the Internet.
- 28. ,a new form of culture in which the culture of humanity will digitalize
- 29. ,a small computer designed for use by a single user at a time
- 31. ,to exchange message and files online
- 32. ,being aware of the nature of the possible threats that you could encounter
- 33. ,the ability to access and analyze media messages
- 34. ,the ability to control how much of your information online.
- 36. ,a piece of software
- 38. ,the apps that allow people, creators, and businesses to communicate