Digital Literacy

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 3. A program that allows users to access and navigate the internet by viewing websites on a computer or mobile device
  2. 5. A social media platform that allows users to post short messages in limited characters
  3. 7. A string of characters used to verify the identity of a user during the authentication process, to be kept private/secret
  4. 9. A social networking site that allows users to connect with friends and family, share information, and engage with others online
  5. 11. Attempting to acquire sensitive data through a fraudulent solicitation in email or on a web site
  6. 15. Global communication network
  7. 18. Malicious software, or malware, that can infect a computer's files or systems and cause damage
  8. 21. Physical components of computers
  9. 22. A unique identifier used to distinguish one user from another, essential for user authentication and authorization
  10. 24. Apple's mobile OS, runs on iPhones and iPads
  11. 25. A social media platform for creating and sharing short videos
  12. 26. Microsoft's desktop OS, runs on many PCs
  13. 27. Malicious software used to gather info and send it to another entity, done to harm the user by violating their privacy, or endangering device security
  14. 28. Mobile operating system based on the Linux kernel and other open-source software, developed by Google
  15. 30. Allows users to access their data from any device with an internet connection, instead of being tied to a specific computer or server
  16. 33. Malware in disguise
  17. 36. Messages distributed by electronic means from one computer user to another
  18. 37. To store data changes permanently
  19. 38. Company that created Chromebook, also a popular search engine
Down
  1. 1. A set of web pages accessible through the internet, conveniently linked and with a specific purpose
  2. 2. A flat, touch-sensitive device that replaces the mouse on laptops and netbooks, allowing you to control the cursor and perform other actions
  3. 4. Interconnected computing devices that can exchange data and share resources with each other
  4. 6. Unauthorized access to a computer, smartphone, or other electronic device
  5. 8. A wireless networking technology that allows devices such as computers, mobile devices , and other equipment to interface with the Internet
  6. 10. A software or hardware used to temporarily store information, often data, in a computer system
  7. 12. Software that scans files or your computer's memory for certain patterns that may indicate the presence of malicious software
  8. 13. A social media app that allows users to send and receive photos and videos that are usually only available for a short time
  9. 14. An online video sharing platform owned by Google
  10. 16. A social media platform that allows users to discover, save, and share ideas through visual pins (recipes, home and style inspiration, and more)
  11. 17. A professional networking platform
  12. 19. Portable computer, like a Chromebook
  13. 20. Input device for typing
  14. 23. Cybersecurity barrier
  15. 29. Non-tangible computer programs
  16. 31. A social media app and platform that allows users to share photos and videos
  17. 32. Small text files that websites send to your browser to store information about your online activity
  18. 34. A digital container within a computer's file system that allows users to organize and store files by grouping them together
  19. 35. Apple's desktop OS