Across
- 6. The skill of evaluating information and sources for accuracy, credibility, and relevance.
- 8. The responsible and ethical use of technology and the internet.
- 10. Harassment, threats, or negative behavior toward others on the internet or through digital devices.
- 11. The quality and complexity of a password, which affects its vulnerability to hacking.
- 12. Controls and options that allow individuals to manage the information they share online and who can access it.
Down
- 1. The set of rules and norms for respectful behavior when communicating online.
- 2. Copying or using someone else's work, ideas, or content without proper attribution or permission.
- 3. A security process that requires users to provide two different authentication methods to access an account, enhancing security.
- 4. The trail of information and data left behind by a person's online activities.
- 5. The ability to use digital tools and technology effectively and responsibly.
- 7. Measures and practices to protect digital devices, networks, and data from online threats.
- 9. Individuals who seek to harm others through online interactions.