ACTIVITY #1: Crossword Puzzle

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 3. Buying and selling goods or services online.
  2. 6. Software for accessing and viewing websites.
  3. 7. Ability to analyze and evaluate media content critically.
  4. 13. Simulation of human intelligence by machines.
  5. 14. Responsible use of technology and the internet.
  6. 15. Legal protection of creative works.
  7. 17. Information in digital form.
  8. 18. Trail of digital activities left behind by a user.
  9. 20. Writing instructions for computers.
  10. 22. Electronic device for processing data.
  11. 23. Reference or connection to another webpage or resource.
  12. 25. Unsolicited or unwanted emails or messages.
  13. 27. Transfer data from a local device to a remote system.
  14. 29. Verifying the identity of a user.
  15. 30. Secret phrase for access control.
  16. 31. Software designed for a specific purpose or task.
  17. 33. Protection against threats.
  18. 35. Precautions to protect against online threats.
  19. 37. Right to control personal information.
  20. 39. Global network connecting computers and devices.
  21. 40. Document displayed on the internet.
  22. 41. Device for forwarding data packets between computer networks.
  23. 42. Physical components of a computer system.
  24. 44. Programs and applications for computers.
  25. 45. Legal principle allowing limited use of copyrighted material.
  26. 46. Malicious software.
  27. 47. Hidden part of the internet not indexed by search engines.
  28. 48. Distributed ledger technology for secure and transparent transactions.
Down
  1. 1. Collection of related web pages.
  2. 2. Individuals who gain unauthorized access to systems or networks.
  3. 4. Criminal activities conducted online.
  4. 5. Platforms for sharing content and connecting with others.
  5. 8. Deliberate exploitation of computer systems or networks.
  6. 9. Creating software using programming languages.
  7. 10. Self-replicating program that spreads and harms systems.
  8. 11. Reference or connection to another webpage or resource (repeated).
  9. 12. Knowledge or data.
  10. 14. Graphical user interface on a computer.
  11. 16. Encoding data for secure transmission.
  12. 19. Exchange of information or messages.
  13. 21. Relating to electronic technology.
  14. 24. Harassment or intimidation online.
  15. 26. Main webpage of a website.
  16. 28. Transfer data from a remote system to a local device.
  17. 30. Fraudulent attempt to obtain sensitive information.
  18. 32. Unauthorized use of someone's personal information.
  19. 34. Information presented on the internet.
  20. 36. Criminal activities conducted online.
  21. 38. Legal regulations governing online activities.
  22. 43. Interconnected computers or devices.