vocab words

1234567891011121314151617181920212223242526272829
Across
  1. 1. the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage
  2. 4. the use of digital devices (phones, computers, social media, gaming) to intentionally and repeatedly harass, threaten, humiliate, or target someone.
  3. 5. a precise, step-by-step set of instructions or rules followed to solve a problem, perform a calculation, or accomplish a task.
  4. 6. the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility
  5. 8. false or inaccurate information.
  6. 10. Balance a high-precision, electronic instrument designed to measure the mass or weight of an object, providing quick and accurate readings on a digital screen, often down to the milligram level.
  7. 12. the process of converting readable information (plaintext) into an unreadable, scrambled format (ciphertext) using an algorithm and a cryptographic key
  8. 18. the ethical, safe, and accountable use of technology, focusing on managing one's digital footprint, respecting others' privacy, and ensuring secure online interactions Empathy:the ability to understand and share the feelings of another.
  9. 22. a person who uses information technology—such as the internet, social media, and mobile devices—regularly, effectively, and responsibly to engage in society, politics, and government
  10. 25. time spent using a device such as a computer, television, or games console. The time allotted to or occupied by a particular subject, actor, etc., on film or television.
  11. 26. Disinformation is false, inaccurate, or misleading information deliberately created and spread to deceive, manipulate, or harm, rather than to inform.
  12. 27. Reality: a technology that overlays digital information—such as 3D models, images, or data—onto the real-world environment in real time using cameras on smartphones, tablets, or headsets
  13. 28. the branch of philosophy involved in the systematic study of what is morally right or wrong, good or bad.
  14. 29. Personal information (PII) is any data that can identify, contact, or locate an individual, either on its own or when combined with other data
Down
  1. 2. a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—the moment they are fixed in a tangible medium.
  2. 3. a non-profit organization providing free, standardized, legal licenses that allow creators to share their work while retaining copyright.
  3. 7. the information about a particular person that exists on the internet as a result of their online activity
  4. 9. a U.S. legal doctrine permitting limited, unlicensed use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research.
  5. 11. tools and configurations on websites, apps, and devices that allow users to control what personal information is shared, who can view their content, and how data is used
  6. 13. Technology addiction is a behavioral disorder characterized by compulsive, excessive use of digital devices (smartphones, social media, gaming)
  7. 14. a person who is present at an event or incident but does not take part.
  8. 15. the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet
  9. 16. a practice similar to piracy but in other contexts, especially hijacking.
  10. 17. the practice of being intentionally aware, present, and purposeful in how you engage with technology, resources, or daily activities, rather than acting on autopilot.
  11. 19. the established standards of respectful, polite, and responsible behavior in online environments
  12. 20. the act of presenting another person’s words, ideas, images, or creative work as your own, without proper attribution or citation.
  13. 21. a form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or phone to steal sensitive information like passwords, credit card numbers, or login credentials
  14. 23. a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
  15. 24. Intelligence the application of computer systems able to perform tasks or produce output normally requiring human intelligence, especially by applying machine learning techniques to large collections of data.