Across
- 1. Universal Serial Bus. an external storgae device.
- 3. instructions and programs for the computer.
- 8. web-based application where documents and spreadsheets can be created, edited, and stored online.
- 9. local area network.
- 11. knowing the rights and wrongs of tech and acting accordingly
- 14. a site where people can add and update content using their own web browser.
- 15. the central processing unit, carries out computer instructions.
- 17. fraud which acquires personal details by getting them out of phone calls from semmingly real organizations.
- 21. privilages, freedoms, and expactations of tech users
- 23. legal rights and restrictions governing tech use.
- 24. email, storage, and data syncronization subscription service, provides storage for free.
- 25. acceptable use policy. written ageement to abide by set technology rules and guidelines.
- 26. a file created or saved by an application.
- 30. applied science of equipment design, intended to reduce discomfort and fatigue and maximize productivity.
- 32. arranging all folders, files, and other documents neatly.
- 34. buying and selling of goods online.
- 35. elements of physical and psycholoigcal well-being related to tech use.
- 38. expanding the number of business and/or social contacts by making connections through individuals.
- 39. cloud storage service integrated with Google's other services and systems.
Down
- 2. repeatedly sent messages meant to pressure you to do something.
- 4. stores groups of files or folders neatly.
- 5. an online journal where readers can interact
- 6. standards of conduct expected by other tech users.
- 7. to steal a work and pass it off as your own.
- 10. software that aids in gathering info about a person or organization without their knowledge or consent.
- 12. gives holder exclusive rights to a creative work.
- 13. the display output device of a computer.
- 14. wide area network.
- 16. the capability to use tech and knowing when and how to use it.
- 18. electronic exchange of information.
- 19. physical computer equipment.
- 20. full electronic participation in society.
- 22. "malicious software". Designed to steal info, inflict damage, commit fraud, and spread spam.
- 24. crime in which personal data is obtained in a way that involves deception or fraud, typically for economic gain.
- 27. using information tech to harass, threaten, or intimidate.
- 28. a file, such as a document, image, or video, that can be shared or put on an email.
- 29. precautions users must take to guarantee personal safety and security.
- 31. the home screen of a computer, where file shortcuts are accessed.
- 33. internet fraud that uses emails and pop-ups to lure victims into providing personal information.
- 36. computer networks connected over the internet for redundancy or cluster computing.
- 37. a document created by a program.
