Computer Ethics Crossword
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
                                                 
 
 
Down: 1) Communication with people by using a type of technology. 3) Never post your personal info., current location, and never post inipropriate things.5) When a child, preteen or teen is tormented by another child, which has to have a minor on both sides of the incident.7) Online etiquette rules- what is proper to do and not to do when using technology. Across: 2) Once an adult becomes involved in the situation it is considered cyber-harassment and when an adult tries to lure a child into an offline meeting.4) Cell phones, computers, social networking sites, tablets and more.6) When employees use their Internet access for personal reasons while maintaining the apperance of working,.8) Federal Trade Commission9) They are guidlines that describe how computer professionals should make decisions.10) People engaged in changing computer security or information without permission.
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type