Library crossword puzzle

123456789101112131415161718192021222324252627282930
Across
  1. 2. he process of scrambling, or encoding, data into an unreadable format (ciphertext) to prevent unauthorized access, ensuring that only those with the correct cryptographic key can unlock and read the original information
  2. 5. the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, and damage
  3. 6. a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—once they are fixed in a tangible form
  4. 8. false or inaccurate information.
  5. 9. a branch of computer science that enables machines to simulate human intelligence, allowing them to learn from data, reason, solve problems, and make decisions
  6. 12. a person who is present at an event or incident but does not take part.
  7. 14. a person who uses information technology—such as the internet, social media, and mobile devices—regularly, effectively, and responsibly to engage in society, politics, and government
  8. 16. the total amount of time spent using devices with screens
  9. 18. the branch of philosophy that systematically studies, defines, and defends concepts of right and wrong behavior
  10. 19. a precise, step-by-step set of instructions or rules followed to solve a specific problem, perform calculations, or accomplish a task
  11. 21. the practice of engaging with technology, resources, or daily activities with conscious awareness, purpose, and intention rather than on autopilot
  12. 24. false information that is intended to mislead; deliberate misinformation.
  13. 27. tools and configurations on websites, apps, and devices that allow users to control what personal information is shared, who can view their content, and how data is used
  14. 29. the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet.
  15. 30. the ability to understand and share the feelings of another.
Down
  1. 1. any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
  2. 3. nonprofit organization that provides free, standardized, and easy-to-use copyright licenses, enabling creators to share their work with the public while retaining copyright
  3. 4. a set of social conventions and rules for polite, respectful, and responsible behavior in online interactions and electronic communication
  4. 7. is a behavioral disorder characterized by compulsive, excessive use of digital devices
  5. 10. a technology that superimposes digital information—such as images, 3D models, or text—onto the real world in real-time, enhancing a user's perception and interaction with their environment
  6. 11. the act of presenting another person's work, words, ideas, or data as your own without proper acknowledgment or citation
  7. 13. the unique trail of data you leave behind while using the internet, including websites visited, emails sent, and information submitted online.
  8. 15. a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
  9. 17. bullying that takes place over digital devices like cell phones, computers, and tablets through SMS, apps, social media, or gaming.
  10. 20. a U.S. legal doctrine under Section 107 of the Copyright Act that permits limited use of copyrighted material without permission from the rights holder
  11. 22. the practice of attacking and robbing ships at sea.
  12. 23. a high-precision, electronic instrument designed to measure the mass or weight of an object, providing quick and accurate readings on a digital screen, often down to the milligram level
  13. 25. the ability to access, analyze, evaluate, create, and act upon all forms of communication, from social media to traditional news.
  14. 26. he fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
  15. 28. the ethical, safe, and sustainable use of technology, focusing on protecting privacy, security, and well-being while understanding the impact of digital actions on society and the environment