PC ethics Crossword
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
                                          
 
 
Down: 1) Communication with other people by using a type of technology: blogs email text messaging social networking sites (web pages) chat rooms web cams 2) Online etiquette rules –what is proper to do and not to do when using technology. 4)  Cyber-bullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. 5) Federal Trade Commission: the nation’s consumer protection agency –prevents fraudulent and unfair business practices in the marketplace (ex. MySpace). 6) This occurs when employees use their Internet access for personal reasons while maintaining the appearance of working. Across: 3) Computer ethics are guidelines that describe how computing professionals should make decisions regarding professional and social conduct when using technology in the workplace. 6) the use of the Internet to stalk someone by identity theft threats harassment false 7) Cyber-communications-communication methods using the Internet. 8) Computer Hacking– people engaged in changing computer security or information without permission
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type