Unit 1: Safety and Orientation

123456789101112131415161718
Across
  1. 3. is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.
  2. 5. Any internet-related illegal activity.
  3. 7. Refers to virtual sexual encounters between two or more persons.
  4. 8. as adult online users who seek to exploit vulnerable children or adolescents for sexual or other abusive purposes.
  5. 10. intentionally harmful; spiteful
  6. 13. Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
  7. 15. is federal legislation in the United States that protects the privacy of students' personally identifiable information (PII). The act applies to all educational institutions that receive federal funds.
  8. 17. the fact or condition of being affected by something or experiencing something
  9. 18. A scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
Down
  1. 1. requires public schools and libraries receiving federal e-rate funds to use a portion of those funds to filter their internet access.
  2. 2. a machine that uses heated rollers to melt plastic onto paper for durability
  3. 4. Methods individuals use to track, lure, or harass another person online.
  4. 6. information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
  5. 9. Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites)
  6. 11. computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
  7. 12. Any technique, software, etc., used to protect computers and prevent online crime.
  8. 14. A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer.
  9. 16. a machine that consist of a lever and a plate that uses a metal die with sharp edges to press into paper therefore cutting the paper into the shape of the die