Across
- 3. Using technologies, including e-mail, Web sites, instant messages, and cellular telephones, to deliberately harass, threaten, or intimidate someone.
- 4. The act of using another person’s words or ideas without giving credit to that person; the act of plagiarizing something.
- 6. Is the ability to act in a safe and responsible manner on the Internet and other connected environments.
- 11. Property of the mind; property (as an idea, invention, or process) that derives from the work of the mind or intellect.
- 12. Websites and other online means of communication that are used by large groups of people to share information and to develop social and professional contacts.
- 13. A series of angry, critical, or disparaging comments exchanged by two or more people in an ongoing online argument.
- 14. A computer program or piece of code that loaded onto a technology system designed to cause damage to computer files.
- 15. Protection giving the owner the exclusive right to reproduce or distribute copies of his or her own work.
Down
- 1. The correct or acceptable way of communicating on the Internet.
- 2. A word used to describe the trail, traces or “footprints” that people leave online.
- 5. Software designed to interfere with a computer's normal functioning.
- 7. A software utility program that searches digital media for programs or pieces of code that are loaded onto technology systems and run without user knowledge or permission. These programs detect viruses and repairs/disinfects files.
- 8. A set of moral principles or values while using technology and the internet.
- 9. The responsible, ethical, legal, and safe use of technology systems by individuals as members of society and citizens of the global community.
- 10. A system designed to prevent unauthorized access to or from a private network.
- 16. The illegal copying and distribution of software. These crimes may be punishable by fines and imprisonment.
