Across
- 2. the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- 5. a geographic network that covers a relatively small geographic area such as a building or a small campus - no more than a mile distance between computers
- 6. those freedoms extended to everyone in a digital world
- 8. largest type of network in terms of geographic area;
- 9. process of teaching and learning about technology and the use of technology
- 12. software designed to infiltrate or damage a computer system without the user's informed consent
- 13. the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
- 15. web-based tools that make it easy for users to add, remove, and change online content
- 16. the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- 17. A series, or log, of discussion items on a page of the World Wide Web
- 18. display consisting of a device that takes signals from a computer and displays them on a CRT screen
- 19. unwanted commercial email messages
- 20. A type of Malware that locates and saves data from users without them knowing about it.
- 22. free, Web-based word processor, spreadsheet, presentation, form, and data storage service offered by Google. It allows users to create and edit documents online while collaborating in real-time with other users.
- 23. The physical components of a computer.
- 25. An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- 27. As users make more purchases online, they must understand how to be effective consumers in a digital economy.
- 30. the practice of taking someone else's work or ideas and passing them off as one's own.
- 33. Universal Serial Bus. A type of connection used to attach devices such as flash drives, scanners, cameras, and printers to a computer.
- 34. Navigating the digital world safely, responsibly, and ethically.
- 35. physical and psychological well-being in a digital technology world
- 36. A service that is offered by Google that allows you to store and share files online
- 37. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
Down
- 1. the process of organizing files and folders; naming appropriately, using folders, etc
- 3. A location on disk where you can store files.
- 4. Navigating the digital world safely, responsibly, and ethically.
- 7. The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently.
- 10. electronic precautions to guarantee safety
- 11. or netiquette as its sometimes called, is a basic set of rules you should follow in order to make the internet better for others, and better for you.
- 14. the programs and other operating information used by a computer.
- 21. Rules or guidelines for the proper use of technology or digital devices within an organization.
- 24. a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information
- 26. the legal rights and restrictions governing technology use
- 28. Enables you to sync mail, calendars, contacts, and other items on iOS
- 29. Central Processing Unit; the brain of the computer.
- 31. electronic exchange of information
- 32. place on computer to store documents.
- 35. An on-screen work area that uses a combination of menus and icons.
