Cyber and Digital Literacy (Crossword Puzzle)
Across
- 3. Protocol used for secure communication over a computer network.
- 6. The use of electronic means such as messaging, social media and other forms of online communication with the intent of abuse.
- 8. Physical components of a computer system, such as the processor, memory, and peripherals.
- 12. A global network that connects millions of computers worldwide.
- 15. It is a malicious software.
- 16. It is the ability to live, learn, and work in a society where communication information access.
- 19. The right of individuals to control access to their personal information.
- 21. Best defined as understanding where to go on the internet to find reliable and correct information.
- 22. Information can be process, stored, and transmitted by computer systems.
- 24. Connected to or accessible via the internet.
- 25. Software used to access and navigate websites and web pages on the internet.
- 26. Collection of web pages accessible via the internet that are typically related to a particular domain or topic.
- 29. The unauthorized copying, distribution, or use of someone else's work.
- 31. The trail of data left behind by interaction in the digital environment.
- 32. A type of software design to protect computer systems from malicious activities.
- 34. Data that is processed and organized to provide meaning and context.
- 37. Type of computer network that is privately owned and restricted to authorize users.
- 39. Small files stored on a user's computer by websites to track preferences and activities.
- 41. A type of malware disguise as legitimate software to gain an authorized access.
- 42. Navigating the digital world responsibly, ethically, and with awareness of one's actions and impact.
- 43. Unauthorized access exposure of sensitive or confidential information.
- 45. Step by step procedure or formula for solving a problem.
- 46. A program that replicates itself in spreads to other computers.
- 47. Programs and applications that run on computer systems to perform specific task.
- 48. Individuals who use computer programming and technical skills to gain authorized access to a computer system.
Down
- 1. It is the use of the internet or other electronic means to stalk or harass an individual.
- 2. It is common type of scam, or which the scammers disguise as trustworthy source.
- 3. Technique used to hide or disguise the true source of electronic communication.
- 4. It is the practice of protecting systems, networks and programs from digital attacks.
- 5. Unsolicited and often irrelevant or inappropriate messages sent over the internet.
- 7. Security system that monitors and controls incoming and outgoing network traffic.
- 9. The process of verifying the identity of a user or system.
- 10. ______ in the 21st century is more than being able to read and write.
- 11. A technique use to protect data by encoding it into a secret format.
- 13. Electronic messages sent over a computer network, typically using email addresses.
- 14. The process of keeping data safe from an authorized access.
- 17. A set of rules governing the use of the internet.
- 18. The process of restoring data to its original form from a coded format.
- 20. An old value that is now applied to a new medium in the internet.
- 23. Tool, Systems, and and methods used to solve problems or accomplished task, often involving the use of electronics, computers, and internet.
- 27. System of interconnected computers, devices, or resources for communication and data exchange.
- 28. Online platform that enable users to create, share, and interact with content and connect with others.
- 30. These are schemes that deceive the users in various ways in an attempt to take advantage of them.
- 33. It is the use of webcams for flirting and cybersex.
- 34. Set of rules governing the exchange of data between devices on a network.
- 35. The process of systematically searching for and fixing vulnerabilities in software.
- 36. Refers the storing and accessing data and programs over the internet instead of a local hard drive or server.
- 38. A tool that enables users to search for information on the internet based on keywords or phrases.
- 40. Malware that encrypts files or locks computers systems and demands payment for decryption or restoration.
- 44. This first to anything that has the potential to cause serious harm to a computer system.