Crossword Puzzle

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
Across
  1. 5. An electronic tool or machine used for specific tasks.
  2. 8. Installing new or improved software to fix issues or add features.
  3. 10. Tricking people into giving away their personal information.
  4. 11. A group of interconnected computers or devices.
  5. 12. Bullying someone using digital devices or platforms.
  6. 14. A secret word or phrase used to access something.
  7. 16. An electronic device that manipulates information or data.
  8. 17. The main means of mass communication.
  9. 21. An example of a computer platform is a desktop computer with Microsoft Windows installed on it
  10. 22. Related to computers or technology.
  11. 23. Protecting digital systems and data from attacks or breaches.
  12. 24. Free from harm or danger.
  13. 25. The device that allows your computers, smartphones,etc. to connect to the internet.
  14. 29. Linking to the internet or another device.
  15. 31. Any criminal activity that involves a computer, network/ed device.
  16. 32. Being accountable for one's actions online.
  17. 33. Software designed to harm or disrupt computer systems.
  18. 35. A person or thing that provides a service or commodity.
  19. 38. Keeping personal information safe and confidential.
  20. 39. Physical and electronic parts of a computer, or metal tools and equipment, or military equipment.
  21. 40. Belief in the reliability or truth of someone or something online.
  22. 44. The process of assigning a code to something for classification or identification.
  23. 46. To determine or set the value or amount of something, or to judge or assess its significance, worth, or quality.
  24. 47. controlled by or connected to another computer or to a network.
  25. 48. A thing that is hidden or stored.
  26. 49. Understanding and recognizing potential risks online.
  27. 50. The ability to acquire and apply knowledge and skills.
  28. 51. Protection from harm, damage, or unauthorized access.
  29. 53. A communication method that uses electronic devices to deliver messages across computer networks.
  30. 54. Being a member of a digital community and acting responsibly.
Down
  1. 1. Relating to society or interaction with others.
  2. 2. Who you are, especially online or in digital form.
  3. 3. A set of related web pages located under a single domain name, typically produced by a single person or organization.
  4. 4. Moral principles that guide behavior.
  5. 6. The programs and other operating information used by a computer
  6. 7. Relating to electronic communication networks and virtual reality.
  7. 9. A computer program with a graphical user interface for displaying and navigating between web pages.
  8. 13. The ability to read, write, and understand information.
  9. 15. Random-access memory.
  10. 18. An electronic communications network that connects computer networks and organizational computer facilities around the world
  11. 19. A person or thing that brings something into existence.
  12. 20. A barrier that blocks unauthorized access to a network.
  13. 26. Converting information into a secret code to prevent unauthorized access.
  14. 27. Facts or data used for communication or knowledge.
  15. 28. A harmful program that can damage computer systems.
  16. 30. Traces or records of online activity.
  17. 34. A user’s access to a digital service or platform.
  18. 36. Unsolicited or unwanted emails or messages.
  19. 37. A set of rules for formatting and processing data.
  20. 41. On the internet include identity theft, cyberbullying, and online harassment.
  21. 42. Permission for something to happen or agreement to do something.
  22. 43. Information stored or transmitted electronically.
  23. 45. Verify the identity of a user or device.
  24. 52. People who gain unauthorized access to computer systems.