Across
- 1. the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage
- 4. the use of digital devices (phones, computers, social media, gaming) to intentionally and repeatedly harass, threaten, humiliate, or target someone.
- 5. a precise, step-by-step set of instructions or rules followed to solve a problem, perform a calculation, or accomplish a task.
- 6. the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility
- 8. false or inaccurate information.
- 10. Balance a high-precision, electronic instrument designed to measure the mass or weight of an object, providing quick and accurate readings on a digital screen, often down to the milligram level.
- 12. the process of converting readable information (plaintext) into an unreadable, scrambled format (ciphertext) using an algorithm and a cryptographic key
- 18. the ethical, safe, and accountable use of technology, focusing on managing one's digital footprint, respecting others' privacy, and ensuring secure online interactions Empathy:the ability to understand and share the feelings of another.
- 22. a person who uses information technology—such as the internet, social media, and mobile devices—regularly, effectively, and responsibly to engage in society, politics, and government
- 25. time spent using a device such as a computer, television, or games console. The time allotted to or occupied by a particular subject, actor, etc., on film or television.
- 26. Disinformation is false, inaccurate, or misleading information deliberately created and spread to deceive, manipulate, or harm, rather than to inform.
- 27. Reality: a technology that overlays digital information—such as 3D models, images, or data—onto the real-world environment in real time using cameras on smartphones, tablets, or headsets
- 28. the branch of philosophy involved in the systematic study of what is morally right or wrong, good or bad.
- 29. Personal information (PII) is any data that can identify, contact, or locate an individual, either on its own or when combined with other data
Down
- 2. a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—the moment they are fixed in a tangible medium.
- 3. a non-profit organization providing free, standardized, legal licenses that allow creators to share their work while retaining copyright.
- 7. the information about a particular person that exists on the internet as a result of their online activity
- 9. a U.S. legal doctrine permitting limited, unlicensed use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research.
- 11. tools and configurations on websites, apps, and devices that allow users to control what personal information is shared, who can view their content, and how data is used
- 13. Technology addiction is a behavioral disorder characterized by compulsive, excessive use of digital devices (smartphones, social media, gaming)
- 14. a person who is present at an event or incident but does not take part.
- 15. the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet
- 16. a practice similar to piracy but in other contexts, especially hijacking.
- 17. the practice of being intentionally aware, present, and purposeful in how you engage with technology, resources, or daily activities, rather than acting on autopilot.
- 19. the established standards of respectful, polite, and responsible behavior in online environments
- 20. the act of presenting another person’s words, ideas, images, or creative work as your own, without proper attribution or citation.
- 21. a form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or phone to steal sensitive information like passwords, credit card numbers, or login credentials
- 23. a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- 24. Intelligence the application of computer systems able to perform tasks or produce output normally requiring human intelligence, especially by applying machine learning techniques to large collections of data.
