Crossword Puzzle
Across
- 6. Trail of digital activities left behind by a user.
- 13. Protection against threats.
- 14. Simulation of human intelligence by machines.
- 16. Device for forwarding data packets between computer networks.
- 17. Responsible use of technology and the internet.
- 20. Physical components of a computer system.
- 24. Individuals who gain unauthorized access to systems or networks.
- 25. Exchange of information or messages.
- 26. Distributed ledger technology for secure and transparent transactions.
- 31. Collection of related web pages.
- 32. Buying and selling goods or services online.
- 35. Deliberate exploitation of computer systems or networks.
- 39. Reference or connection to another webpage or resource (repeated).
- 42. Malicious software.
- 43. Legal regulations governing online activities.
- 44. Ability to analyze and evaluate media content critically.
- 45. Fraudulent attempt to obtain sensitive information.
- 46. Harassment or intimidation online.
- 48. Information presented on the internet.
- 49. Interconnected computers or devices.
Down
- 1. Criminal activities conducted online.
- 2. Hidden part of the internet not indexed by search engines.
- 3. Transfer data from a remote system to a local device.
- 4. Knowledge or data.
- 5. Electronic device for processing data.
- 7. Criminal activities conducted online.
- 8. Programs and applications for computers.
- 9. Secret phrase for access control.
- 10. Platforms for sharing content and connecting with others.
- 11. Relating to electronic technology.
- 12. Reference or connection to another webpage or resource.
- 15. Encoding data for secure transmission.
- 18. Unsolicited or unwanted emails or messages.
- 19. Right to control personal information.
- 21. Document displayed on the internet.
- 22. Verifying the identity of a user.
- 23. Writing instructions for computers.
- 24. Main webpage of a website.
- 27. Graphical user interface on a computer.
- 28. Legal principle allowing limited use of copyrighted material.
- 29. Self-replicating program that spreads and harms systems.
- 30. Transfer data from a local device to a remote system.
- 33. Creating software using programming languages.
- 34. Software designed for a specific purpose or task.
- 36. Software for accessing and viewing websites.
- 37. Legal protection of creative works.
- 38. Precautions to protect against online threats.
- 40. Unauthorized use of someone's personal information.
- 41. Global network connecting computers and devices.
- 47. Information in digital form.