2.2 Quels dangers la cyber-société pose-t-elle?
Across
- 1. To promote (9)
- 4. Manipulative (12)
- 7. To download (11)
- 11. Risk (6)
- 14. Connected (7)
- 17. Email (20)
- 18. To log on (12)
- 20. Bullying (11)
- 23. Computer programme (8)
- 24. To combat / to fight (8)
- 25. To affect (7)
- 26. Device (8)
- 27. To eliminate (8)
- 29. To spread / broadcast (8)
- 30. Trustworthiness (9)
- 32. Policy (8)
- 33. Freedom (7)
- 37. To dare (4)
- 40. To spread (10)
- 41. Under age (under 18) (6)
- 43. To use (9)
- 44. Cyber crime (16)
- 45. To face up to (10)
Down
- 2. Vulnerable / at risk (10)
- 3. To intervene (9)
- 5. Intrusion (9)
- 6. Messaging service (10)
- 8. File (7)
- 9. Real (4)
- 10. Trustworthy (6)
- 12. Internet user (11)
- 13. Unknown (7)
- 15. Victim (7)
- 16. Scare (7)
- 19. Manipulation (12)
- 21. To believe (6)
- 22. Password (10)
- 24. Cyberbullying (16)
- 28. Adult (over 18) (6)
- 31. Unique identifier (18)
- 34. To monitor (10)
- 35. Fraud (6)
- 36. Security / safety (8)
- 38. Report (9)
- 39. To send (6)
- 42. Meeting (9)