Compuer ethics Crossword
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
                                                    
 
 
Down: 1) this occurs when employees use their internet access for personal reasons while maintaining the appearance of working. cost of employees is $1 billion a year in computer resources and loss of productivity 2) don't put personal information3) communications with other people by using a type of technology; blogs, emails, messaging, social networking sites, chat rooms, and webcams.4) guide lines that describe computing professionals should make decisions regarding professional and social conduct when using technology in the work place. composed by Walter Mayner 6) online etiquette rules- what is proper. to do and not to do when using technology. 8) people engaged In changing computer security of information without permission.9) is when a child, preteen, or teen is tormented, threatened, harassed, humiliated, or embarrassed otherwise targeted by another minor Across: 5) federal trade commison7) when an adult is trying to lure a child into offline meetings, it is called exploitation. it can also involve identity theft, threats, harassment, or false.10) phone, computer.
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type