The Virtual World

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 1. A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user.
  2. 6. Communication in real-time over the internet, typically text-based.
  3. 8. Controls that allow users to determine how much information they want to share with others on digital platforms.
  4. 9. A security process in which users provide two different authentication factors to verify themselves.
  5. 11. A live, visual communication between two or more people via computer or mobile device.
  6. 14. A security system designed to prevent unauthorized access to or from a private network.
  7. 15. The network of physical devices embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
  8. 17. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  9. 18. A collection of web pages accessible via the internet.
  10. 20. The identification or estimation of the real-world geographic location of an object, such as a mobile device or internet-connected computer.
  11. 21. A secret word or phrase used for authentication and to gain access to a system.
  12. 22. Measures taken to protect computer systems and data from unauthorized access or cyber attacks
  13. 24. A machine that processes data and performs tasks according to a set of instructions.
  14. 25. The unauthorized access, disclosure, or acquisition of sensitive information.
  15. 28. A software agent that assists users with tasks or provides information in a virtual environment.
  16. 32. Connected to or accessible via the internet.
  17. 33. Transfer data from a remote computer to a local device.
  18. 34. A unique name used to identify oneself on a computer system or online platform.
  19. 35. The process of converting information or data into a code to prevent unauthorized access.
Down
  1. 2. A global network connecting millions of computers worldwide.
  2. 3. The fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity.
  3. 4. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  4. 5. The trail of data left behind by users when they interact with digital platforms.
  5. 7. A digital representation of a user in a virtual environment.
  6. 10. A simulated experience that can be similar to or completely different from the real world.
  7. 12. An enhanced version of reality where computer-generated information is overlaid on the real world.
  8. 13. The online representation of an individual's identity, based on data attributes and activities associated with that individual.
  9. 16. Electronic mail sent and received via the internet.
  10. 19. The virtual environment created by interconnected computer systems.
  11. 23. Transfer data from a local device to a remote computer.
  12. 26. The delivery of computing services—such as servers, storage, databases, networking, software, and analytics—over the internet.
  13. 27. The act of playing electronic games, often on devices such as computers, consoles, or mobile phones.
  14. 29. Transmitting or receiving data, typically audio or video, over a computer network in real-time.
  15. 30. Software used to access and view websites on the internet.
  16. 31. Websites and applications that enable users to create and share content or participate in social networking.