Crossword Puzzle

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 4. Main webpage of a website.
  2. 6. Information in digital form.
  3. 8. Knowledge or data.
  4. 10. Buying and selling goods or services online.
  5. 11. Malicious software.
  6. 13. Platforms for sharing content and connecting with others.
  7. 16. Information presented on the internet.
  8. 17. Software designed for a specific purpose or task.
  9. 19. Relating to electronic technology.
  10. 20. Protection against threats.
  11. 22. Interconnected computers or devices.
  12. 24. Device for forwarding data packets between computer networks.
  13. 26. Deliberate exploitation of computer systems or networks.
  14. 28. Harassment or intimidation online.
  15. 30. Physical components of a computer system.
  16. 31. Unsolicited or unwanted emails or messages.
  17. 34. Global network connecting computers and devices.
  18. 37. Collection of related web pages.
  19. 39. Individuals who gain unauthorized access to systems or networks.
  20. 40. Right to control personal information.
  21. 42. Software for accessing and viewing websites.
  22. 43. Verifying the identity of a user.
  23. 45. Programs and applications for computers.
  24. 47. Legal regulations governing online activities.
  25. 48. Precautions to protect against online threats.
  26. 49. Reference or connection to another webpage or resource (repeated).
  27. 50. Creating software using programming languages.
Down
  1. 1. Responsible use of technology and the internet.
  2. 2. Encoding data for secure transmission.
  3. 3. Transfer data from a local device to a remote system.
  4. 5. Writing instructions for computers.
  5. 7. Electronic device for processing data.
  6. 9. Exchange of information or messages.
  7. 12. Transfer data from a remote system to a local device.
  8. 14. Simulation of human intelligence by machines.
  9. 15. Hidden part of the internet not indexed by search engines.
  10. 18. Legal principle allowing limited use of copyrighted material.
  11. 21. Legal protection of creative works.
  12. 23. Document displayed on the internet.
  13. 25. Trail of digital activities left behind by a user.
  14. 27. Criminal activities conducted online.
  15. 29. Distributed ledger technology for secure and transparent transactions.
  16. 32. Self-replicating program that spreads and harms systems.
  17. 33. Reference or connection to another webpage or resource.
  18. 35. Criminal activities conducted online.
  19. 36. Ability to analyze and evaluate media content critically.
  20. 38. Unauthorized use of someone's personal information.
  21. 41. Fraudulent attempt to obtain sensitive information.
  22. 44. Secret phrase for access control.
  23. 46. Graphical user interface on a computer.