Across
- 1. Is the transfer of data from one digital devices to another
- 5. Privilegedaccessmanagement
- 9. Is about expressing ourselves artistically online
- 15. To add security features within the computer apps or software to prevent it from cyber attack
- 18. Allows sharing ideas and information, including text and visual, through virtual network and communities
- 20. Having the knowledge and skills you need to participate in making change in your community
- 22. a sever site,or method that delivers media to an audience
- 23. Process of transferring files from a user computers to the webserver
- 25. A person who commits fraud or participate in a dishonest scheme
- 30. A secret word or expression used by authorized person to prove their right to access information, etc.
- 33. The process of transferring files from a computer
- 37. The hardware and software use to create, store, transmit, manipulate and display information and data.
- 38. acts performed by individual with harmful intent, whose goal is to steal data cause damage to a disrupt computing system
- 39. A sever cyber security threats that leverages the networking capabilities of computers to spread Malicious programs,steal data and damage or destroy computers and computer system
- 40. Creating a copy of the data on your system that you use for recovery Incase your original data is last or corrupter
- 43. individual ability to find evaluate,and communicate information using typing or digital media platform
- 44. Safeguards information from loss through backup and recovery
- 45. The right to control how your information is view and used
- 46. Operating system
- 47. Constructivedigitalliteracy
Down
- 2. Global network of billions of computers and other electronic devices
- 3. security Process that prevents sensitive information from getting into the wrong hands
- 4. Vertualprivatenetwork
- 6. address. Address is a string of numbers separated by periods
- 7. Malware
- 8. A scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicity
- 9. Civicdigitalliteracy
- 10. Unauthorizedaccess
- 11. The use of technology to harass, threaten, embarrass, or target another person
- 12. Emailspoofing
- 13. Communicationdigitalliteracy
- 14. The ability to find, evaluate, use, share and create content using digital devices
- 16. form of media that uses dectronic devices distribution
- 17. appreciating and respecting different cultures online
- 19. Refers to responsible use of technology by anyone who use computers the internet and digital devices to engage with society on any level
- 21. Impression made by the papilarry ridges on the ends of the fingers and thombs
- 23. It is a process of transferring files from the users computers to the webserver (on the internet)
- 24. Understanding where to go on the internet to find reliable and correct information
- 26. Design to give a full, multi-layered, end to end protection solution to give your peace of mind when it comes to cyber security
- 27. are any illegitimate internet website used to deceive users into fraud or malicious attack s
- 28. Is a machine that can be programmed to automatically carry out sequence of arithmetic or logical operations
- 29. To aid the user doing specific task
- 31. Popups
- 32. Any activity designed to protect the ability and integrity of your network and data
- 34. Is a way to conceal information by altering it so that it appears to be random data
- 35. Collection of programs and data that tell computer running
- 36. The trial of data you leave when using the internet
- 41. Collection of files and related resources accessable through the world wide web and the uhh internet via a domain name
- 42. Tells a machine which actions to perform and how to complete task
