Digital Technology Final part 2

123456789101112131415161718192021
Across
  1. 6. The practice of expanding the number of one's business and or social contacts by making connections through individuals
  2. 10. An act of fraud, involves both stealing someone's work and lying about it afterwards
  3. 12. Full electronic participation in society
  4. 13. The legal rights and restrictions governing technology use
  5. 14. The buying and selling of goods online
  6. 17. protects the original work of the creator
  7. 19. The precautions that all technology users must take to guarantee their personal safety and security of their work
  8. 20. one who knows what is right and wrong exhibits intelligent technology behavior and makes good choices when using technology
  9. 21. A third party website that takes your information and sells it without your consent
Down
  1. 1. to obtain financial or other confidential information from people by placing phone calls, typically automated, that seem to be from a legitimate organization, usually a finical institution
  2. 2. The standards of conduct expected by other digital technology users
  3. 3. Unsolicited communication sent in bulk
  4. 4. The privileges' and freedoms extended to all digital technology users and all behavior expectations that come with it
  5. 5. The use of email, text, chat rooms, pagers, or other forms of technology to harass, threaten, or intimidate someone.
  6. 7. the elements of physical and psychological well being related to digital technology use
  7. 8. The capability to use digital technology and knowing when and how to use it
  8. 9. The electronic exchange of information
  9. 11. Malicious software; designed to steal information, inflict damage upon your computer, commit fraud, and spread spam
  10. 15. a crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain
  11. 16. The study of productivity in a work place setting
  12. 18. Internet fraud in the form of emails or op up messages to lure users into providing usernames, passwords, and personal information