Computer ethics Crossword
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
                                                       
 
 
Down: 1) dont list birth dates, location, social security 3) The guidelines that describe how computing professionals should make decisions regarding professional and social conduct when using technology in the workplace 4) people engage in changing computer security or info without permission 5) communicating with other people by using a piece of technology 8) a child, preteen or teen is formatted, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child preteen or teen Across: 2) online etiquette rules- what is proper to do and not to do when using technology 6) blogs, email, text, webpages, chat rooms webcams7) Federal trade communication 9) the use of the internet to stalk someone by identity theft 10) when employees use their internet access for personal reasons while keeping the appearance of working
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type