Crossword Puzzle
Across
- 4. Main webpage of a website.
- 6. Information in digital form.
- 8. Knowledge or data.
- 10. Buying and selling goods or services online.
- 11. Malicious software.
- 13. Platforms for sharing content and connecting with others.
- 16. Information presented on the internet.
- 17. Software designed for a specific purpose or task.
- 19. Relating to electronic technology.
- 20. Protection against threats.
- 22. Interconnected computers or devices.
- 24. Device for forwarding data packets between computer networks.
- 26. Deliberate exploitation of computer systems or networks.
- 28. Harassment or intimidation online.
- 30. Physical components of a computer system.
- 31. Unsolicited or unwanted emails or messages.
- 34. Global network connecting computers and devices.
- 37. Collection of related web pages.
- 39. Individuals who gain unauthorized access to systems or networks.
- 40. Right to control personal information.
- 42. Software for accessing and viewing websites.
- 43. Verifying the identity of a user.
- 45. Programs and applications for computers.
- 47. Legal regulations governing online activities.
- 48. Precautions to protect against online threats.
- 49. Reference or connection to another webpage or resource (repeated).
- 50. Creating software using programming languages.
Down
- 1. Responsible use of technology and the internet.
- 2. Encoding data for secure transmission.
- 3. Transfer data from a local device to a remote system.
- 5. Writing instructions for computers.
- 7. Electronic device for processing data.
- 9. Exchange of information or messages.
- 12. Transfer data from a remote system to a local device.
- 14. Simulation of human intelligence by machines.
- 15. Hidden part of the internet not indexed by search engines.
- 18. Legal principle allowing limited use of copyrighted material.
- 21. Legal protection of creative works.
- 23. Document displayed on the internet.
- 25. Trail of digital activities left behind by a user.
- 27. Criminal activities conducted online.
- 29. Distributed ledger technology for secure and transparent transactions.
- 32. Self-replicating program that spreads and harms systems.
- 33. Reference or connection to another webpage or resource.
- 35. Criminal activities conducted online.
- 36. Ability to analyze and evaluate media content critically.
- 38. Unauthorized use of someone's personal information.
- 41. Fraudulent attempt to obtain sensitive information.
- 44. Secret phrase for access control.
- 46. Graphical user interface on a computer.