10.Technology Trail
Across
- 1. Advanced computing technology
- 3. Pocket computer.
- 6. Data-storing computer.
- 7. Alexa or Siri.
- 10. Fingerprint security.
- 13. Computer brain.
- 15. Digital immersive experience.
- 16. Digital programs.
- 18. Embedded software.
- 22. Online data storage.
- 25. Mobile program.
- 26. Machine automation.
- 28. Hostage-taking code.
- 29. Online harassment.
- 32. Wireless data transfer.
- 34. Human verification.
- 35. Programming language.
- 37. Online meeting app.
- 38. Problem-solving steps.
- 40. Aerial remote device.
- 41. Social media tag.
- 42. Electronic path.
- 43. Hidden online space.
- 45. Software market.
- 46. Advanced AI.
- 48. Online networking.
- 49. Online manners.
- 52. Illicit crypto mining.
- 53. Online identity.
- 54. Online video device.
- 56. Android robot.
- 57. Connected devices network.
- 60. Computer start-up code.
- 61. Digital security barrier.
- 62. Data protection.
Down
- 2. Decentralized money.
- 4. Web scripting language.
- 5. User interaction area.
- 7. Private browsing tool.
- 8. Wearable tech timepiece.
- 9. Computer virus.
- 11. Cryptocurrency pioneer.
- 12. Error fixing.
- 14. Image dots.
- 17. Harmful software.
- 19. Storage unit.
- 20. Dynamic web behavior.
- 21. Machine learning.
- 23. Web address.
- 24. Layered creation.
- 27. Web language.
- 30. Apple smartphone.
- 31. Navigation technology.
- 33. Immersive gear.
- 36. Digital intruder.
- 39. Connection wires.
- 40. Unauthorized access.
- 42. Digital locker.
- 44. Online device location.
- 47. Tiny-scale science.
- 50. Portable storage.
- 51. Data transfer speed.
- 55. Math-based problem solver.
- 58. Wireless connection.
- 59. Keystroke tracker.