Across
- 2. When someone tries to get personal data online by pretending to be someone else.
- 3. Someone who has the right to copy, publish, sell, or distribute a creative work.
- 7. A group of people with shared goals or interests, or who live or connect in the same place. A community can also be online.
- 10. People who gather and sell personal information that's shared online.
- 12. Creative works that can be used by the public, but may have restrictions on how they are used.
- 14. Content or ads that was paid to appear in certain searches or locations.
- 15. A fake screen name. Sometimes, these are used for cyber-bullying. Often, people figure out who is really behind these fake accounts.
- 21. When someone identifies you in a comment or picture online. This involves linking to your profile.
- 22. When your device alerts you that you have a new like, comment, or follow on social media.
- 23. Unwanted, aggressive, and repeated actions (or actions that could be repeated). It happens when there's a power imbalance. That imbalance could be physical or social. It could also be real or imagined.
- 25. Your right to express your ideas and opinions through the things you say, write or create.
- 27. A collection of data from a person's online activity that can be traced back to them. It's made up of data that can be found online.
- 29. Legal information that companies share when you use their services. The policy tells you how they gather and use your information.
- 31. Specific times when copyrighted material can be used without permission (usually for research, reporting, or teaching).
- 33. Prejudice felt about certain things, people, or groups. Prejudice is an opinion that isn't based on reason or fact.
- 34. Something that's no longer copyrighted because a certain amount of time has passed.
- 36. Image and information about you that you set up on social media, games, or other apps.
- 38. When someone gets access to a system and steals your data to use or sell.
- 39. Bullying that happens online. It's often in the form of harassing messages or posts. Sometimes those posts are anonymous.
- 40. Content that you share, but didn't create yourself.
- 41. A group of people who connect online. This group might not live in the same location, but has shared goals or interests.
Down
- 1. Your right to be part of a group and take action within that group.
- 2. Direct or first-hand stories that come from the time period when the event being discussed happened.
- 4. Content that spreads rapidly on the Internet.
- 5. When an app uses GPS to track where you are remotely. Some apps share your location through their site.
- 6. When you feel the emotions you think someone else feels. It happens easily on social media.
- 8. Information that talks about or explains primary sources and are created by someone who didn't participate in the event.
- 9. When you check and think about social media a lot. This can cause stress, anxiety, and depression.
- 11. name The name you create for yourself that people see on games, social media, or other apps.
- 13. Places online where data can get stolen.
- 16. Taking someone else's words or ideas and presenting them as your own.
- 17. When someone doesn't know their information was gathered and it becomes part of their digital footprint.
- 18. Who others think you are, based on what you post online.
- 19. This introduces damage or gains access to your computer. Once it has access, it can steal your information. The phrase is short for malicious software.
- 20. When you compare your life to others' social media posts and feel like your life is worse.
- 24. Part of the visible light spectrum. This comes from digital devices and disrupts the hormones in your brain and can make it hard to sleep.
- 26. Someone with a lot of followers and connections.
- 28. digital footprint When someone shares information on purpose and it becomes part of their digital footprint.
- 30. A software application you download to your device (such as a smartphone or tablet). There are apps for social media, games, etc.
- 32. The scientific study of how the brain works.
- 35. When someone pretends to be you, by using your personal information.
- 37. Sending written messages by phone.