ACTIVITY #1: Crossword Puzzle

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 1. Trail of digital activities left behind by a user.
  2. 5. Secret phrase for access control.
  3. 7. Deliberate exploitation of computer systems or networks.
  4. 8. Interconnected computers or devices.
  5. 11. Right to control personal information.
  6. 15. Hidden part of the internet not indexed by search engines.
  7. 17. Writing instructions for computers.
  8. 20. Main webpage of a website.
  9. 24. Unsolicited or unwanted emails or messages.
  10. 27. Simulation of human intelligence by machines.
  11. 28. Platforms for sharing content and connecting with others.
  12. 29. Legal protection of creative works.
  13. 35. Document displayed on the internet.
  14. 36. Fraudulent attempt to obtain sensitive information.
  15. 37. Software designed for a specific purpose or task.
  16. 40. Distributed ledger technology for secure and transparent transactions.
  17. 43. Malicious software.
  18. 45. Verifying the identity of a user.
  19. 46. Physical components of a computer system.
  20. 47. Self-replicating program that spreads and harms systems.
  21. 49. Precautions to protect against online threats.
Down
  1. 2. Knowledge or data.
  2. 3. Responsible use of technology and the internet.
  3. 4. Transfer data from a remote system to a local device.
  4. 6. Criminal activities conducted online.
  5. 9. Encoding data for secure transmission.
  6. 10. Creating software using programming languages.
  7. 12. Harassment or intimidation online.
  8. 13. Exchange of information or messages.
  9. 14. Protection against threats.
  10. 16. Software for accessing and viewing websites.
  11. 18. Unauthorized use of someone's personal information.
  12. 19. Ability to analyze and evaluate media content critically.
  13. 21. Collection of related web pages.
  14. 22. Buying and selling goods or services online.
  15. 23. Programs and applications for computers.
  16. 25. Electronic device for processing data.
  17. 26. Graphical user interface on a computer.
  18. 29. Legal regulations governing online activities.
  19. 30. Legal principle allowing limited use of copyrighted material.
  20. 31. Individuals who gain unauthorized access to systems or networks.
  21. 32. Transfer data from a local device to a remote system.
  22. 33. Relating to electronic technology.
  23. 34. Reference or connection to another webpage or resource.
  24. 38. Reference or connection to another webpage or resource (repeated).
  25. 39. Information presented on the internet.
  26. 41. Information in digital form.
  27. 42. Criminal activities conducted online.
  28. 44. Device for forwarding data packets between computer networks.
  29. 48. Global network connecting computers and devices.