Across
- 2. Online moral principles.
- 3. Tech-enabled capability.
- 6. Online harassment.
- 7. Tech proficiency.
- 10. Digital image.
- 13. Tech competency.
- 15. Personal info fraud.
- 16. Network security barrier.
- 18. Online self-representation.
- 19. Digital illegal activities.
- 20. Personal recognition.
- 21. Digital data secrecy.
- 27. Data protection.
- 29. Personal info protection.
- 31. Malicious program blocker.
- 32. Protection measures.
- 33. Access authentication code.
- 38. Data transfer to web.
- 39. Harmful software.
- 40. Global web network.
- 41. Responsible online behavior.
- 44. Fraudulent schemes.
- 46. Effective digital info use.
- 47. Online conduct regulations.
- 48. Secure data encoding.
- 49. Digital threat knowledge.
Down
- 1. Personal online journals.
- 2. Analytical reasoning.
- 4. Secure web browsing.
- 5. Malicious digital assault.
- 8. Digital threat protection.
- 9. Digital education.
- 11. Identity verification.
- 12. Digital threat potential.
- 14. Digital security measures.
- 17. Online activity traces.
- 22. Web navigation software.
- 23. Digital education platform.
- 24. Info safeguarding measures.
- 25. Tech access gap.
- 26. Unauthorized info access.
- 28. thinking: Logical analysis.
- 30. Malicious intrusion.
- 34. Personal info protection.
- 35. Internet precaution.
- 36. Defense against digital threats.
- 37. Online data secrecy.
- 42. Digital safety practices.
- 43. Deceptive data theft tactics.
- 45. Digital communication.