ACTIVITY 1: Crossword Puzzle 2A

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 2. Relating to digital technology.
  2. 5. Bullying online.
  3. 10. Protection from harm.
  4. 12. Protecting digital systems.
  5. 15. Control over personal information.
  6. 16. Malicious software.
  7. 20. Connected to the internet.
  8. 21. Fraudulent information request.
  9. 28. Having knowledge and using technology safely and effective
  10. 29. Malicious self-replicating code.
  11. 30. Software to access websites.
  12. 31. Unique characteristics of an individual.
  13. 32. Interconnected computers.
  14. 34. Intentional attack on systems.
  15. 38. Global computer network.
  16. 40. Secret access code.
  17. 42. Traces of online activity.
  18. 43. Unsolicited messages.
  19. 45. Criminal activities online.
  20. 46. Hardware with a function.
  21. 48. Deceptive scheme.
  22. 49. Information in digital form.
  23. 50. Computer programs.
Down
  1. 1. Relating to society.
  2. 3. the ability to analyze and evaluate infomation.
  3. 4. A cyber attack that redirects website traffic to a fraudulent site
  4. 6. Organized and meaningful data.
  5. 7. Unauthorized system access.
  6. 8. Moral principles online.
  7. 9. Traces of online activity.
  8. 11. Verifying user identity.
  9. 13. Making a copy of data to protect against loss or damage
  10. 14. Practices for cybersecurity.
  11. 17. Communication channels.
  12. 18. Protecting systems from attacks.
  13. 19. Converting data into code.
  14. 22. Ability to use digital tools.
  15. 23. Understanding cybersecurity threats.
  16. 24. Laws governing cyberspace.
  17. 25. Membership in a country.
  18. 26. Unauthorized use of personal information.
  19. 27. Network security system.
  20. 33. A secret codr used to access a computer system or online account
  21. 34. Data stored by websites.
  22. 35. Knowledge or perception of a situation.
  23. 36. Dual authentication.
  24. 37. Software to detect and remove viruses.
  25. 39. Device forwarding data.
  26. 41. Physical computer components.
  27. 44. Measures for protection.
  28. 47. Unauthorized data access.