Digital Technology Final Review

123456789101112131415161718192021222324252627282930313233343536373839404142434445
Across
  1. 4. the ability to navigate, evaluate, and communicate information online or in a digital format.
  2. 6. Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets.
  3. 12. responsible use of technology and etiquette pertaining to an online presence.
  4. 14. responsible for all actions taken with their digital identity
  5. 18. provide one or more ways to categorize or tag pages to support the maintenance of such index pages.
  6. 20. the programs and other operating information used by a computer.
  7. 22. the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each of which is a data center.
  8. 23. enables users to sync their data to the cloud, including mail, contacts, calendars, photos, notes and files, to collaborate on documents, backup an iPhone or iPad, and track lost devices.
  9. 24. A location on disk where you can store files.
  10. 25. software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user
  11. 27. vcentral processing unit.
  12. 28. the practice of taking someone else's work or ideas and passing them off as one's own
  13. 29. acceptable use policy
  14. 30. when a criminal obtains or uses the personal information; e.g., name, login, Social Security number (SSN), date of birth, etc., of someone else to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
  15. 33. irrelevant or inappropriate messages sent on the internet to a large number of recipients.
  16. 34. a file sent with an email message
  17. 35. wide area network
  18. 40. the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
  19. 41. online word processor included as part of the free, web-based Google Docs Editors suite offered by Google
  20. 43. Treat others with respect, regardless of income, ethnicity, gender, physical location or disability
  21. 45. commercial transactions undertaken through digital platforms, primarily the internet.
Down
  1. 1. one that is paperless in its original form, like an invoice that’s sent as a PDF file (via email).
  2. 2. an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity:
  3. 3. the process of organizing files and folders; naming appropriately, using folders, etc.
  4. 5. a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
  5. 7. the study of people's efficiency in their working environment.
  6. 8. malicious software that is installed on your PC usually without your knowledge and it can enter your PC as a result of surfing the Internet and in a variety of different ways.
  7. 9. place on computer to store documents
  8. 10. resources employed to protect your online identity, data, and other assets.
  9. 11. discipline that includes digital care programs, technologies with health, healthcare, living, and society to enhance the efficiency of healthcare delivery and to make medicine more personalized and precise.
  10. 13. An on-screen work area that uses a combination of menus and icons.
  11. 15. any computer-based technology for communicating.
  12. 16. an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply (interfacing) between computers, peripherals and other computers.
  13. 17. appropriate action if their digital identity has been compromised
  14. 19. This means that the original creators of products and anyone they give authorization to are the only ones with the exclusive right to reproduce the work.
  15. 21. integrity, or sense of self management, and general responsibility for your actions as well as yourself on the internet and treating people like you would in real life.
  16. 26. The physical components of a computer.
  17. 31. ability to connect to the internet or other digital networks.
  18. 32. key component of Google Workspace
  19. 36. the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers
  20. 37. their digital identity from unauthorized use
  21. 38. Treat others with respect. ... Rule 2: Do not steal. ... Rule 3: Shop on secured sites. ... Rule 4: Never give out personal information, including phone numbers, addresses, and “check-ins” on social media. ... Rule 5: Social media is not a place to air drama- keep that for a journal.
  22. 39. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  23. 42. local area network
  24. 44. appropriate action if their personal info