Across
- 5. the responsibility of being safe online and following online rules
- 7. A program on a computer that allows the user to create, edit, view, print, rename, copy, or delete files, folders, or an entire file system
- 8. is internet fraud in the form of emails or pop-ups to lure users into providing usernames, and passwords
- 9. servers that are accessed over the Internet, and the software and databases that run on those servers
- 11. the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself
- 13. An app which allows you to create letters, documents, stories, similar to Microsoft Word
- 15. document created by programs which makes up for operating systems
- 17. a device that is used for showing, watching, or listening to something on computer
- 19. the precautions that all technology users must take to guarantee their personal safety and the security of their network
- 22. web site allows user to add content using their won web
- 26. is short for malicious software and is designed to steal info, inflict damage upon your computer, commit fraud, and spread spam
- 27. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- 28. A single place to store, access, create, edit, and share documents, files, and folders of all types
- 30. a person who develops the skills and knowledge to effectively use the internet and digital technologies
- 31. Universal Serial Bus. A type of connection used to attach devices such as flash drives, scanners, cameras, and printers to a computer
- 32. online journals create interaction from readers
- 33. wide area network
- 34. files embedded within online communication channels such as emails, instant messages, or social networks
- 35. unsolicited, unwanted commercial email messages
- 37. exclusive right to sell, publish, or reproduce creative works for a specified number of years
- 38. The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently
- 39. physical equipment that makes up computer system
Down
- 1. A crime that involves someone pretending to be another person in order to steal money or obtain benefits
- 2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
- 3. a personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table
- 4. the buying and selling of goods online
- 6. the priviledges and freedoms extended to all digital technology users and the behavioral expectations that come with them
- 10. obtain financial info from people that seem to be from legitimate organizations by phone calls
- 12. the ability to fully participate in digital society
- 14. instructions/programs that tell the computer what to do
- 16. involves an organization's online communication efforts
- 18. acceptable use policy
- 19. a written or printed record that gives information or proof
- 20. the electronic standards of conduct or procedure
- 21. stores groups of files in organized fashion
- 23. local area network
- 24. Apple's version of cloud storage
- 25. the capability to use digital technology and knowing when and how to use it
- 29. central processing unit
- 36. taking ideas or other forms of intellectual effort and passing them off as one's own
