Computer ethics Crossword
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
 
 
Down: 1) when people engaged in changing computer security or information without permission 3) Computer ethics are guidelines that describe how computing professionals should make decisions regarding professional and social conduct when using technology in the workplace6) Cyber-bullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. 7) Communication with other people by using a type of technology: blogs email text messaging social networking sites (web pages) chat rooms web cams 8) This occurs when employees use their Internet access for personal reasons while maintaining the appearance of working. Across: 2) blogs, email , text messaging , social networking , chat rooms , webcams 4) Online etiquette rules –what is proper to do and not to do when using technology5) don't post current location personal information NEVER post anything inappropriate 9) the use of the internet to stalk someone by: . identity theft . threats . harassment . false. 10) federal trade commission
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type