Digital literacy

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 1. Is the transfer of data from one digital devices to another
  2. 5. Privilegedaccessmanagement
  3. 9. Is about expressing ourselves artistically online
  4. 15. To add security features within the computer apps or software to prevent it from cyber attack
  5. 18. Allows sharing ideas and information, including text and visual, through virtual network and communities
  6. 20. Having the knowledge and skills you need to participate in making change in your community
  7. 22. a sever site,or method that delivers media to an audience
  8. 23. Process of transferring files from a user computers to the webserver
  9. 25. A person who commits fraud or participate in a dishonest scheme
  10. 30. A secret word or expression used by authorized person to prove their right to access information, etc.
  11. 33. The process of transferring files from a computer
  12. 37. The hardware and software use to create, store, transmit, manipulate and display information and data.
  13. 38. acts performed by individual with harmful intent, whose goal is to steal data cause damage to a disrupt computing system
  14. 39. A sever cyber security threats that leverages the networking capabilities of computers to spread Malicious programs,steal data and damage or destroy computers and computer system
  15. 40. Creating a copy of the data on your system that you use for recovery Incase your original data is last or corrupter
  16. 43. individual ability to find evaluate,and communicate information using typing or digital media platform
  17. 44. Safeguards information from loss through backup and recovery
  18. 45. The right to control how your information is view and used
  19. 46. Operating system
  20. 47. Constructivedigitalliteracy
Down
  1. 2. Global network of billions of computers and other electronic devices
  2. 3. security Process that prevents sensitive information from getting into the wrong hands
  3. 4. Vertualprivatenetwork
  4. 6. address. Address is a string of numbers separated by periods
  5. 7. Malware
  6. 8. A scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicity
  7. 9. Civicdigitalliteracy
  8. 10. Unauthorizedaccess
  9. 11. The use of technology to harass, threaten, embarrass, or target another person
  10. 12. Emailspoofing
  11. 13. Communicationdigitalliteracy
  12. 14. The ability to find, evaluate, use, share and create content using digital devices
  13. 16. form of media that uses dectronic devices distribution
  14. 17. appreciating and respecting different cultures online
  15. 19. Refers to responsible use of technology by anyone who use computers the internet and digital devices to engage with society on any level
  16. 21. Impression made by the papilarry ridges on the ends of the fingers and thombs
  17. 23. It is a process of transferring files from the users computers to the webserver (on the internet)
  18. 24. Understanding where to go on the internet to find reliable and correct information
  19. 26. Design to give a full, multi-layered, end to end protection solution to give your peace of mind when it comes to cyber security
  20. 27. are any illegitimate internet website used to deceive users into fraud or malicious attack s
  21. 28. Is a machine that can be programmed to automatically carry out sequence of arithmetic or logical operations
  22. 29. To aid the user doing specific task
  23. 31. Popups
  24. 32. Any activity designed to protect the ability and integrity of your network and data
  25. 34. Is a way to conceal information by altering it so that it appears to be random data
  26. 35. Collection of programs and data that tell computer running
  27. 36. The trial of data you leave when using the internet
  28. 41. Collection of files and related resources accessable through the world wide web and the uhh internet via a domain name
  29. 42. Tells a machine which actions to perform and how to complete task