Computer Ethics Review Crossword
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
                                                   
 
 
Down: 1) Once an adult becomes involved in the situation,it is called......... When an adult is trying to lure a child into offline meetings, that is called exploitation, not cyber-bullying. This can result in criminal charges. 2) never post personal information , never post inappropriate things, and never post current location.3) This occurs when employees use their Internet access for personal reasons while maintaining the appearance of working. 4) Communication with other people by using a type of technology: blogs email text messaging social networking sites (web pages) chat rooms web cams 5) guildelines that describe how computing professionals should make decisions reguarding professional and social conduct when using technology in the workplace. Across: 3) people engaged in changing computer security without permission6) Cyber-bullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.It has to have a minor (child) on both sides of the incident, or at least have been instigated by a minor against another minor. 7) Facebook, skype, oovoo, email, phone, facetime, computers, twitter, and ect..8) what is proper to do and not to do when using technology. 9) Federal Trade Commission
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type