ACTIVITY #1: Crossword Puzzle
Across
- 3. Buying and selling goods or services online.
- 6. Software for accessing and viewing websites.
- 7. Ability to analyze and evaluate media content critically.
- 13. Simulation of human intelligence by machines.
- 14. Responsible use of technology and the internet.
- 15. Legal protection of creative works.
- 17. Information in digital form.
- 18. Trail of digital activities left behind by a user.
- 20. Writing instructions for computers.
- 22. Electronic device for processing data.
- 23. Reference or connection to another webpage or resource.
- 25. Unsolicited or unwanted emails or messages.
- 27. Transfer data from a local device to a remote system.
- 29. Verifying the identity of a user.
- 30. Secret phrase for access control.
- 31. Software designed for a specific purpose or task.
- 33. Protection against threats.
- 35. Precautions to protect against online threats.
- 37. Right to control personal information.
- 39. Global network connecting computers and devices.
- 40. Document displayed on the internet.
- 41. Device for forwarding data packets between computer networks.
- 42. Physical components of a computer system.
- 44. Programs and applications for computers.
- 45. Legal principle allowing limited use of copyrighted material.
- 46. Malicious software.
- 47. Hidden part of the internet not indexed by search engines.
- 48. Distributed ledger technology for secure and transparent transactions.
Down
- 1. Collection of related web pages.
- 2. Individuals who gain unauthorized access to systems or networks.
- 4. Criminal activities conducted online.
- 5. Platforms for sharing content and connecting with others.
- 8. Deliberate exploitation of computer systems or networks.
- 9. Creating software using programming languages.
- 10. Self-replicating program that spreads and harms systems.
- 11. Reference or connection to another webpage or resource (repeated).
- 12. Knowledge or data.
- 14. Graphical user interface on a computer.
- 16. Encoding data for secure transmission.
- 19. Exchange of information or messages.
- 21. Relating to electronic technology.
- 24. Harassment or intimidation online.
- 26. Main webpage of a website.
- 28. Transfer data from a remote system to a local device.
- 30. Fraudulent attempt to obtain sensitive information.
- 32. Unauthorized use of someone's personal information.
- 34. Information presented on the internet.
- 36. Criminal activities conducted online.
- 38. Legal regulations governing online activities.
- 43. Interconnected computers or devices.