Across
- 2. The use of electronic communication to harass, intimidate, or threaten individuals, typically through social media, messaging apps, or online forums.
- 4. The main screen area on a computer where icons, windows, and other graphical elements are displayed.
- 7. a concept that refers to the ability to ascertain who the author of a text is, what their biases are, how authoritative the information may be, and so on.
- 9. Being able to solve problems in digital environment
- 10. Building resilience to digital threats and challenges, including cyberbullying, online scams, and misinformation, through education, awareness, and support networks.
- 11. A display screen used to visually output information from a computer.
- 12. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity in an electronic communication.
- 15. With video games becoming increasingly interactive and connected, familiarizing oneself with the norms and practices of these virtual landscapes are crucial.
- 18. the standard language used to create and design web pages.
- 21. Knowing how to access and navigate the internet effectively, including using web browsers, conducting searches, evaluating website credibility, and understanding basic internet safety and security practices.
- 22. An electronic device that processes data and performs tasks according to instructions.
- 23. The process of transferring data from a remote computer or server to a local device.
- 24. Wireless networking technology that allows devices to connect to the internet without the need for physical cables.
- 25. A live online seminar or presentation conducted over the internet, typically featuring audio, video, and interactive elements.
- 26. the ability to understand and use information in multiple formats from a wide range of sources when it is presented via computers
- 27. a unit of digital information comprising eight bits
- 30. A satellite-based navigation system that provides location and time information anywhere on or near the Earth.
- 33. a programming language that a computer can execute
- 35. To gain unauthorized access to a computer system
- 38. Understanding the importance of protecting personal information online and implementing strategies to safeguard digital identity and data.
- 40. A collection of data stored in a computer under a specific name.
- 41. Understanding and interpreting data and statistics, including those presented in digital formats, to make informed decisions and conclusions.
- 42. The maximum rate of data transfer across a network connection, typically measured in bits per second (bps) or megabits per second (Mbps).
- 44. Recognizing the potential of digital technologies to empower individuals and communities, including access to information, education, and economic opportunities.
- 45. Understanding the principles of cybersecurity and learning to identify vulnerabilities and potential threats in digital systems, often used for defensive purposes.
- 47. Being aware of common cybersecurity threats, such as malware, phishing, and social engineering, and implementing best practices to protect oneself and others online.
- 48. a method of exchanging digital messages over the internet.
- 49. Ethical principles and considerations related to the use of digital technologies, including privacy, transparency, accountability, and the ethical implications of cyber operations and capabilities.
- 50. Knowledge and practices to protect oneself and others from online threats, scams, and harmful content.
Down
- 1. Accessing and participating in digital educational resources, courses, and programs, often facilitated through learning management systems and online platforms.
- 3. A networking device that forwards data packets between computer networks, typically using IP addresses.
- 5. Knowing how to safely and effectively shop online represents digital literacy.
- 6. Possessing the ability to write, post, and maintain a blog is an essential facet of digital literacy.
- 8. Criminal activities carried out by means of computers or the internet, such as hacking, identity theft, fraud, and cyber espionage.
- 13. the ability to locate, identify, retrieve, process and use digital information optimally
- 14. Acknowledging the disparities in access to digital technologies and resources based on factors such as socioeconomic status, geographic location, age, and disability, and working to bridge these gaps.
- 16. Strategies and measures employed to protect computer systems, networks, and data from cyber threats, including preventive, detective, and corrective actions.
- 17. A device that enables computers to transmit data over telephone or cable lines.
- 19. A software application used to access and view information on the World Wide Web.
- 20. Online platforms and websites that enable users to create and share content, connect with others, and interact in virtual communities.
- 28. The ability to objectively analyze and evaluate information, arguments, and evidence, crucial for navigating the vast amount of digital content.
- 29. A program that searches for and identifies items in a database matching keywords or specified criteria.
- 31. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
- 32. Understanding one's rights, responsibilities, and ethical behavior in digital environments, including issues related to online privacy, security, copyright, and appropriate online conduct.
- 34. Understanding different modes of online communication, including email, instant messaging, social media, and video conferencing, and being able to communicate effectively and respectfully in digital environments.
- 36. The process of transferring data from a local device to a remote computer or server.
- 37. Understanding how to use a computer, including tasks such as turning it on/off, navigating the operating system, using a keyboard and mouse, managing files and folders, and connecting to the internet.
- 39. organized and processed for analysis or storage.
- 43. A global network of interconnected computers that allows communication and information sharing.
- 44. Relating to or using signals or information represented by discrete values (digits) of a physical quantity.
- 46. Physical components of a computer system, such as the monitor, keyboard, and motherboard.