ICT in Real World

1234567891011121314
Across
  1. 2. website where users can post and read messages on different topics
  2. 3. ____ information should not be shared with strangers
  3. 6. Police use ____ to help fight crime.
  4. 10. emails can contain ____, which can harm computers
  5. 12. a diary kept on the internet
  6. 13. ____virus software can be used to remove viruses in a device
  7. 14. websites where users go into virtual room to talk to others
Down
  1. 1. ____ controlled devices at home, acts as a computer.
  2. 2. Control system can be represented by a ____
  3. 4. a type of a computer
  4. 5. ____ is an illegal access into someone's computer
  5. 7. personal information that should not be shared with strangers
  6. 8. ____ is a software where we can send and receive messages and files
  7. 9. cyber____ is a crime happens online
  8. 11. junk emails are called as ____