Across
- 10. The use of electronic communication to bully a person.
- 14. An additional security step requiring two methods to verify identity.
- 16. The set of rules for proper behaviour in online communication.
- 17. Copying someone else's work and claiming it as your own.
- 18. Accepted social behaviour and norms, especially online.
- 19. The right to keep your personal information secure and not shared without taken.
Down
- 1. Working together to achieve a common goal or complete a task.
- 2. Platforms where users create and share content or participate in social networking.
- 3. The trail or trace you leave behind when you use the internet.
- 4. Measures are taken to protect personal information from unauthorised access.
- 5. The responsible and appropriate use of technology in the digital world.
- 6. Legal protection for original works of authorship.
- 7. A scam to steal personal information by pretending to be a trustworthy source.
- 8. The amount of time spent using a device like a computer or a smartphone.
- 9. A licensing system that allows the sharing and use of creative works under certain conditions.
- 11. A method of securing information by converting it into a code.
- 12. A secret word or phrase that must be used to gain admission to something.
- 13. False or misleading information presented as if it were real news.
- 15. Principles that govern how data should be collected, shared, and used.
- 17. Works are free for anyone to use because they are not protected by copyright.
