ACTIVITY #1: Crossword Puzzle

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 2. Distributed ledger technology for secure and transparent transactions.
  2. 10. Protection against threats.
  3. 13. Buying and selling goods or services online.
  4. 15. Software designed for a specific purpose or task.
  5. 18. Physical components of a computer system.
  6. 19. Legal regulations governing online activities.
  7. 22. Transfer data from a remote system to a local device.
  8. 23. Unauthorized use of someone's personal information.
  9. 25. Programs and applications for computers.
  10. 26. Verifying the identity of a user.
  11. 27. Creating software using programming languages.
  12. 29. Software for accessing and viewing websites.
  13. 33. Document displayed on the internet.
  14. 36. Collection of related web pages.
  15. 38. Simulation of human intelligence by machines.
  16. 43. Main webpage of a website.
  17. 44. Unsolicited or unwanted emails or messages.
  18. 47. Legal protection of creative works.
  19. 48. Writing instructions for computers.
  20. 49. Exchange of information or messages.
  21. 50. Global network connecting computers and devices.
Down
  1. 1. Hidden part of the internet not indexed by search engines.
  2. 3. Harassment or intimidation online.
  3. 4. Individuals who gain unauthorized access to systems or networks.
  4. 5. Malicious software.
  5. 6. Graphical user interface on a computer.
  6. 7. Trail of digital activities left behind by a user.
  7. 8. Responsible use of technology and the internet.
  8. 9. Fraudulent attempt to obtain sensitive information.
  9. 11. Transfer data from a local device to a remote system.
  10. 12. Criminal activities conducted online.
  11. 14. Information presented on the internet.
  12. 16. Interconnected computers or devices.
  13. 17. Deliberate exploitation of computer systems or networks.
  14. 20. Knowledge or data.
  15. 21. Device for forwarding data packets between computer networks.
  16. 24. Criminal activities conducted online.
  17. 28. Precautions to protect against online threats.
  18. 30. Legal principle allowing limited use of copyrighted material.
  19. 31. Electronic device for processing data.
  20. 32. Right to control personal information.
  21. 34. Reference or connection to another webpage or resource (repeated).
  22. 35. Ability to analyze and evaluate media content critically.
  23. 37. Platforms for sharing content and connecting with others.
  24. 39. Reference or connection to another webpage or resource.
  25. 40. Encoding data for secure transmission.
  26. 41. Relating to electronic technology.
  27. 42. Secret phrase for access control.
  28. 45. Information in digital form.
  29. 46. Self-replicating program that spreads and harms systems.