Across
- 3. Trying to break into computer systems
- 5. someone who doesn't do anything in a bullying situation.
- 10. When something happens on digital media that makes you feeluncomfortable, worried, sad, or anxious.
- 11. An attempt to trick someone, usually with the intention of stealing money or private information.
- 13. Information that comes to us through the internet, often through a tablet,smartphone, or laptop.
- 16. When someone poses as an institution, like a bank or school, and sends you a personalized message asking you to provide private information.
- 18. A type of crime in which your private information is stolen and used forcriminal activity.
- 21. A web address that has been condensed and which could mislead an user into going into a risky website.
- 22. Able to be believed; trustworthy.
Down
- 1. Someone who understands how the person being bullied feels.
- 2. To carefully examine something to figure out its value.
- 4. bullying some one though the internet
- 6. Using media in a way that feels healthy and in balance with other lifeactivities(family, friends, school, hobbies, etc...).
- 7. To engage in activities that don't involve devices, apps, or the internet.
- 8. Without a name or other information that identifies who you are.
- 9. Information about you that can be used to identify you because it is unique to you (e.g. your full name or your address).
- 12. Someone who responds to bullying by supporting the person being bullied.
- 14. a fake Instagram account used for posting to a specific group of people or to post anonymously.
- 15. Potentially harmful to one’s well-being.
- 17. Some one who has knowledge in programming and computers.
- 19. Someone who intentionally and illegally into another persons system to obtain information.
- 20. Someone who confronts the bully.
