1
information about a person that exists on the internet as a result of online activity
2
controls on social networking sites that determine what others can see
3
the illegal use of someone else's personal information
4
passing off someone else's ideas as your own OR using someone else's work without giving them credit
5
a common type of malware; money is demanded in order to regain access
6
There are about 500,000 online __________ at any given moment.
7
someone who does not just sit by quietly and watch as another is being bullied
8
arguments that go back and forth, power is fairly balanced
9
one person or group has a lot more power over another, frequently attempts physical or emotional
10
another common type of malware
11
stands for malicious software; it is designed to damage the computer and/or collect personal information
12
Cyberbullying is NOT an example of free __________
13
Things don't always disappear just because you __________ them.
14
NOT a source to give credit to, it is a search engine
15
you should always give __________ for images, music, and videos that you use but didn't create yourself.
16
you should power this off at the end of the school day to keep it up to date
17
the motive behind most online scams
18
someone who posts comments on websites just to make people angry
19
Online predators pretend to be someone you can __________