Across
- 1. Central Processing Unit
- 5. the use of another's original words or ideas as though they were your own
- 7. having the right and freedom to use all types of digital technology while using the technology in an acceptable and appropriate manner
- 11. Malicious software, designed to steel information, inflict damage, commit fraud, and spread spam.
- 13. The use of online communication to harass or threaten someone. STOP BLOCK TELL
- 15. Someone who knows what is write and wrong to do in the Tec world.
- 19. A single place to store, access, create, edit, and share documents, files, and folders of all types.
- 21. Acceptable Use Policy
- 22. Apple's version of cloud storage
- 23. the stealing of copyrighted work by downloading or copying it in order to keep, sell or give it away without permission and without paying
- 24. A means by which people use the Internet to communicate and share information among their immediate friends, and meet and connect with others through common interests, experiences, and friends.
- 26. unsolicited, unwanted commercial email messages
- 29. The precautions that all tech users must go through in order to ensure their personal safety and security of their network.
- 30. wide area network
- 31. The elements of physical and phycological well being related to digital tech use.
- 32. a written or printed record that gives information or proof
- 33. web site allows user to add content using their won web
- 35. The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently.
- 36. Universal Serial Bus. A type of connection used to attach devices such as flash drives, scanners, cameras, and printers to a computer.
- 37. the stealing of copyrighted work by downloading or copying it in order to keep, sell or give it away without permission and without paying
- 38. exclusive right to sell, publish, or reproduce creative works for a specified number of years
- 39. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 40. instructions/programs that tell the computer what to do
- 41. A program on a computer that allows the user to create, edit, view, print, rename, copy, or delete files, folders, or an entire file system
Down
- 2. when people send you phony emails, messages or links to fake websites in order to hook you into giving out your personal and financial information.
- 3. document created by programs which makes up for operating systems
- 4. general responsibility for your actions on the Internet, respecting others, following the rules of the website you're using, or just being kind to others
- 6. capability of using tech and knowing when and how to use it.
- 8. local area net work
- 9. The legal rights and restrictions governing tech users
- 10. physical equipment that makes up computer system
- 12. a personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table
- 14. An app which allows you to create letters, documents, stories, similar to Microsoft Word.
- 15. The electronic exchange of info.
- 16. servers that are accessed over the Internet, and the software and databases that run on those servers.
- 17. Full electronic participation in society.
- 18. online journals create interaction from readers
- 20. The buying and selling of goods online.
- 25. A crime that involves someone pretending to be another person in order to steal money or obtain benefits
- 27. a device that is used for showing, watching, or listening to something on computer
- 28. obtain financial info from people that seem to be from legitimate organizations by phone calls
- 34. stores groups of files in organized fashion
