Digital Literacy 2 GHS

12345678910111213141516171819202122
Across
  1. 2. A type of license that allows creators to share their work
  2. 4. Software designed to damage or gain unauthorized access to computers or networks
  3. 5. The programs and operating information used by a computer
  4. 6. The record of one's online activity, including websites visited and posts made
  5. 8. The main storage device that holds data, files, and the operating systems
  6. 9. An incident where private information is accesses or released without permission
  7. 11. Copying someone else's work or ideas without giving proper credit
  8. 12. Legal protection for creators of original work such as writing, art, or music
  9. 13. Harassment or bullying that occurs through digital devices or online platforms
  10. 14. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
  11. 15. The process of converting data into code to prevent unauthorized access
  12. 17. Intentionally posting inflammatory or off-topic messages to provoke others
  13. 18. The rules of polite and responsible behavior when communicating online
  14. 19. A malicious program that replicates itself and spreads to other computers
  15. 20. A group of connected computers that share data and resources
  16. 22. The physical parts of a computer, like the keyboard, monitor, and hard drive
Down
  1. 1. A security process requiring two forms of verification to access an account
  2. 2. The moral principles that guide online behavior and computer use
  3. 3. A program that securely stores and organizes passwords
  4. 7. Controls that allow users to manage who can see their online content
  5. 10. Responsible and ethical use of technology and online resources
  6. 16. A network security system that monitors and controls incoming and outgoing traffic
  7. 21. A type of malware that locks files or systems until a ransom is paid