Comeputer ethics Crossword
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
                                         
 
 
Down: 1) once an adult becomes involved in the situation. Use of the internet to stalk someone by identy theft, threarts, harassment , and false.3) Dont put personal stuff, be careful what you post, and dont put what you are.6) Occours when employees use their internet access for personal reasons while maintaining the apperance of working.7) communication with other people by using a type of technology. -blogs, email, text messages, social networking sites, chat rooms, and web cams. Across: 2) Guidelines that describes how computing professionals should make decisions regarding professional and social conduct when using technology in the work place.4) Twitter, Facebook, Instagram, cell phones, computers, and all social networking sites.5) people engaged in changing computer security or information without peermission.8) Federal trade commenision.9) When a child,preteen,or teen is targeted by a child,preteen,or teen.10) Online etiquette rules- what is proper to do and not do when using.
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type