Cyber and Digital Literacy (Crossword Puzzle)

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 3. Protocol used for secure communication over a computer network.
  2. 6. The use of electronic means such as messaging, social media and other forms of online communication with the intent of abuse.
  3. 8. Physical components of a computer system, such as the processor, memory, and peripherals.
  4. 12. A global network that connects millions of computers worldwide.
  5. 15. It is a malicious software.
  6. 16. It is the ability to live, learn, and work in a society where communication information access.
  7. 19. The right of individuals to control access to their personal information.
  8. 21. Best defined as understanding where to go on the internet to find reliable and correct information.
  9. 22. Information can be process, stored, and transmitted by computer systems.
  10. 24. Connected to or accessible via the internet.
  11. 25. Software used to access and navigate websites and web pages on the internet.
  12. 26. Collection of web pages accessible via the internet that are typically related to a particular domain or topic.
  13. 29. The unauthorized copying, distribution, or use of someone else's work.
  14. 31. The trail of data left behind by interaction in the digital environment.
  15. 32. A type of software design to protect computer systems from malicious activities.
  16. 34. Data that is processed and organized to provide meaning and context.
  17. 37. Type of computer network that is privately owned and restricted to authorize users.
  18. 39. Small files stored on a user's computer by websites to track preferences and activities.
  19. 41. A type of malware disguise as legitimate software to gain an authorized access.
  20. 42. Navigating the digital world responsibly, ethically, and with awareness of one's actions and impact.
  21. 43. Unauthorized access exposure of sensitive or confidential information.
  22. 45. Step by step procedure or formula for solving a problem.
  23. 46. A program that replicates itself in spreads to other computers.
  24. 47. Programs and applications that run on computer systems to perform specific task.
  25. 48. Individuals who use computer programming and technical skills to gain authorized access to a computer system.
Down
  1. 1. It is the use of the internet or other electronic means to stalk or harass an individual.
  2. 2. It is common type of scam, or which the scammers disguise as trustworthy source.
  3. 3. Technique used to hide or disguise the true source of electronic communication.
  4. 4. It is the practice of protecting systems, networks and programs from digital attacks.
  5. 5. Unsolicited and often irrelevant or inappropriate messages sent over the internet.
  6. 7. Security system that monitors and controls incoming and outgoing network traffic.
  7. 9. The process of verifying the identity of a user or system.
  8. 10. ______ in the 21st century is more than being able to read and write.
  9. 11. A technique use to protect data by encoding it into a secret format.
  10. 13. Electronic messages sent over a computer network, typically using email addresses.
  11. 14. The process of keeping data safe from an authorized access.
  12. 17. A set of rules governing the use of the internet.
  13. 18. The process of restoring data to its original form from a coded format.
  14. 20. An old value that is now applied to a new medium in the internet.
  15. 23. Tool, Systems, and and methods used to solve problems or accomplished task, often involving the use of electronics, computers, and internet.
  16. 27. System of interconnected computers, devices, or resources for communication and data exchange.
  17. 28. Online platform that enable users to create, share, and interact with content and connect with others.
  18. 30. These are schemes that deceive the users in various ways in an attempt to take advantage of them.
  19. 33. It is the use of webcams for flirting and cybersex.
  20. 34. Set of rules governing the exchange of data between devices on a network.
  21. 35. The process of systematically searching for and fixing vulnerabilities in software.
  22. 36. Refers the storing and accessing data and programs over the internet instead of a local hard drive or server.
  23. 38. A tool that enables users to search for information on the internet based on keywords or phrases.
  24. 40. Malware that encrypts files or locks computers systems and demands payment for decryption or restoration.
  25. 44. This first to anything that has the potential to cause serious harm to a computer system.