Across
- 3. Websites where you can watch videos or listen to music.
- 5. Finding out if information is false.
- 6. A process or set of rules for solving a problem.
- 10. The process of converting information into a code to keep it safe.
- 13. Tricking people into giving personal information.
- 17. Controlling the information you leave online.
- 21. Checking if someone is really who they say they are.
- 23. Online accounts pretending to be someone else.
- 24. When information is stolen from a company or website.
Down
- 1. Tools to work with others over the internet.
- 2. Spending too much time on social media.
- 4. Responsible use of technology and the internet.
- 7. Managing how long you use a device.
- 8. Rules you agree to before using a website.
- 9. A security step that uses two methods to log in.
- 11. A trick to get you to share personal information.
- 12. A system to block unauthorized access to a network.
- 14. Protecting devices and networks from attacks.
- 15. A tool to keep your internet activity private.
- 16. Items bought within an app.
- 18. Passwords that are hard to guess.
- 19. Dangers of using Wi-Fi networks that are not secure.
- 20. Being online without sharing your identity.
- 22. Small files saved on your computer to track websites you visit.
- 25. A tool to stop ads from showing on websites.