Cybersecurity Basics #1
Across
- 2. The inventions that come from science and research. Makes our lives easier. Examples are computers, cell phones and tablets which help us communicate with others and do tasks like homework.
- 6. Refers to how people keep their digital information from being stolen and defend against other cyber threats and attacks.
- 8. Made up of letters and numbers. Used to get on to a computer or website. Private and used by one person only.
- 9. Protection from harm or danger. For example, the lock on your bike keeps the bike from being stolen.
Down
- 1. Connects millions of computers all over the world. It uses wires to connect computers to other computers that are far away.
- 3. Technology Commonly known as IT. Refers to anything related to computers. People who work in this field keep computers working properly.
- 4. A machine or piece of equipment, such as a cell phone, tablet, GPS, printer, or mouse, that either works like a computer or is attached to a computer.
- 5. A name, word, or characters you use to get access to a computer, cell phone, tablet or website. Also called user IDs.
- 7. To keep you or your information from harm. For example, you wear sunscreen to keep from getting a sunburn.
- 9. To be free from danger or harm. For example, you follow rules to avoid danger, keep from getting hurt or losing something.