Vocab words

1234567891011121314151617181920212223242526272829
Across
  1. 3. high-precision electronic instrument used to measure the mass or weight of an object, providing a fast, accurate digital readout.
  2. 6. the ethical, safe, and sustainable use of technology, encompassing accountability for one's online actions, data privacy, and digital footprint.
  3. 7. a person who uses information technology regularly, effectively, and responsibly to engage in society, politics, and government.
  4. 8. nonprofit organization that provides free, standardized, and irrevocable legal licenses allowing creators to share their work with the public, granting specific permissions for reuse while retaining copyright
  5. 10. Use:the practice of being fully present, conscious, and intentional in our daily actions, technology usage, and consumption
  6. 12. a form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or websites to trick users into revealing sensitive data like passwords, credit card numbers, and login credentials
  7. 13. tools in software, web browsers, and social media that allow users to manage who can access their personal information, activity, and content.
  8. 15. the excessive, compulsive, and poorly controlled use of digital devices—such as smartphones, computers, and social media—that leads to impairment, distress, or negative consequences in daily life.
  9. 16. time spent using a device such as a computer, television, or games console.
  10. 18. Illegal reproduction, distribution, use, or counterfeiting of copyrighted software without authorization from the owner
  11. 20. the ability to understand, share, and vicariously experience the feelings, thoughts, and perspectives of another person
  12. 21. the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage.
  13. 24. an individual who witnesses bullying, injustice, or high-risk situations and chooses to intervene to support the target, rather than remaining a passive bystander
  14. 25. (PII or Personal Data) is any data that identifies, relates to, describes, or can be reasonably linked, directly or indirectly, to a specific individual or household.
  15. 28. an individual who observes a conflict, emergency, or injustice without directly participating,
  16. 29. the unique, often permanent trail of data and information a user intentionally or unintentionally leaves behind while using the internet.
Down
  1. 1. the unethical act of using another person's ideas, words, or work without proper attribution, representing them as one's own
  2. 2. a branch of applied philosophy that analyzes the moral, legal, and social implications of computer technology, guiding the responsible behavior of users and IT professionals
  3. 4. Reality:a technology that superimposes computer-generated digital elements—such as images, text, or 3D models—onto a live, real-world view
  4. 5. the standard of conduct and polite behavior expected online to ensure respectful, professional, and safe communication
  5. 8. a form of intellectual property law protecting original works of authorship—such as books, music, art, and software—fixed in a tangible medium of expression
  6. 9. a field of computer science dedicated to creating systems capable of performing tasks that typically require human intelligence.
  7. 11. a precise, step-by-step set of instructions used to solve problems, perform computations, or automate tasks, transforming inputs into desired outputs
  8. 14. false or inaccurate information spread without malicious intent, distinct from "disinformation" (deliberately misleading) and "malinformation" (factual, yet manipulated to harm).
  9. 17. the sum of characteristics, behaviors, and data—such as usernames, profiles, browsing history, and purchasing habits—that represent a person or entity in digital spaces
  10. 19. willful, repeated, and hostile behavior intended to harm, threaten, or humiliate others through digital devices like phones, computers, and social media
  11. 22. false information that is intended to mislead; deliberate misinformation
  12. 23. a U.S. legal doctrine permitting limited use of copyrighted material without permission for purposes such as criticism, news reporting, teaching, and research
  13. 26. he process of converting information or data into an unreadable, scrambled format (ciphertext) to prevent unauthorized access, ensuring only authorized parties with a specific key can unlock and read it
  14. 27. ability to access, analyze, evaluate, create, and act using all forms of communication.