Across
- 1. The buying and selling of goods and services over the internet.
- 5. Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
- 7. Voice over Internet Protocol, a technology that allows voice communication over the internet instead of traditional telephone lines.
- 8. Engineering: Manipulating individuals to disclose sensitive information or perform actions that may harm them or their organization.
- 11. Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
- 13. Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
- 16. To transfer data from a remote server to a local device over the internet.
- 18. Digital or virtual currency that uses cryptography for security and operates independently of a central bank.
- 20. Unsolicited and often unwanted email or messages sent in bulk, typically for advertising purposes.
- 22. Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
- 23. Small digital icons or characters used to express emotions or ideas in electronic communication.
- 24. Hypertext Markup Language, the standard language used for creating web pages and applications on the internet.
- 26. Domain Name System, a system that translates domain names (e.g., www.example.com) into IP addresses to locate resources on the internet.
- 27. A live or pre-recorded seminar, workshop, or presentation conducted over the internet.
- 29. A security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and threats.
Down
- 2. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems and networks.
- 3. To transfer data from a local device to a remote server over the internet.
- 4. A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
- 6. A form of cyber attack where attackers impersonate trustworthy entities to deceive individuals into revealing sensitive information.
- 9. Media: Online platforms that enable users to create and share content, communicate, and connect with others.
- 10. Internet of Things, the network of physical devices embedded with sensors, software, and connectivity, enabling them to exchange data and interact with the internet and other devices.
- 11. Storage: Storing and accessing data over the internet on remote servers rather than on local devices.
- 12. Address: A unique numerical identifier assigned to each device connected to a computer network, enabling communication between devices.
- 14. The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
- 15. A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
- 17. Virtual Private Network, a secure connection that allows users to access the internet privately and securely by encrypting their data.
- 19. Electronic mail that allows users to send and receive messages and files over the internet.
- 20. Secure Sockets Layer, a protocol that provides secure communication over the internet by encrypting data transmitted between a web server and a browser.
- 21. A networking device that forwards data packets between computer networks, allowing devices to connect to the internet.
- 25. A global network of interconnected computers that enables the sharing of information and resources.
- 28. Uniform Resource Locator, the address used to access a web page or resource on the internet.
- 30. A wireless networking technology that allows devices to connect to the internet without the need for physical cables.