Computer Ethics Review Crossword
|
Down:
1) Once an adult becomes involved in the situation,it is called.........
When an adult is trying to lure a child into offline meetings, that is called exploitation, not cyber-bullying. This can result in criminal charges.
2) never post personal information , never post inappropriate things, and never post current location.3) This occurs when employees use their Internet access for personal reasons while maintaining the appearance of working.
4) Communication with other people by using a type of technology:
blogs
email
text messaging
social networking sites (web pages)
chat rooms
web cams
5) guildelines that describe how computing professionals should make decisions reguarding professional and social conduct when
using technology in the workplace.
|
Across:
3) people engaged in changing computer security without permission6) Cyber-bullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.It has to have a minor (child) on both sides of the incident, or at least have been instigated by a minor against another minor.
7) Facebook, skype, oovoo, email, phone, facetime, computers, twitter, and ect..8) what is proper
to do and not to do when using
technology.
9) Federal Trade Commission |
 |
 |
|