Across
- 2. possess critical thinking skills in understanding all societal issues
- 5. refers to criminal activities that are conducted using computers, networks, or digital technologies as tools, targets, or mediums.
- 9. means having a good understanding of cybersecurity practices, online etiquette, digital privacy, and the ability to use technology responsibly.
- 10. refers to the status of a user being actively connected and available for interaction on a specific social media platform.
- 14. entails taking responsibility for one's role in cyberspace
- 15. develop an understanding of online security, identity and data management in our own literacy practices
- 16. refers to the understanding, knowledge, and consciousness individuals have about the risks, challenges, and opportunities present in the digital environment
- 18. a term that refers to a new form of literacy that goes beyond traditional literacy skills such as reading and writing
- 24. refers to the digital persona or representation of an individual in the online world.
- 25. global network of interconnected computer networks
- 26. are used to track user activity, store preferences, remember login information, and personalize the browsing experience
- 28. refers to the digital trail or record of one’s online activities, interactions, and presence across digital platforms and networks.
- 31. refers to the practice of protecting computer systems, networks, devices, and data from cyber threats
- 34. a Complex and multifaceted
- 36. develop an understanding of the processes, procedures and systems that lie behind digital technologies rather than the specific elements of software/hardware involved.
- 37. type of cyber attack in which cybercriminals use deceptive tactics to trick individuals into providing sensitive information, such as passwords, usernames, credit card details, or personal data
- 40. is a software program designed to detect, prevent, and remove malicious software
- 41. describe the ability to effectively manage and navigate the vast amount of information available in the digital age
- 42. developing a cultural component of digital literacy
- 43. also known as “Redditors,” can vote on submissions, comment on posts, and engage in discussions on a wide range of topics, interests, and communities.
- 44. short for malicious software
- 45. various forms of communication channels and platforms used to deliver information
Down
- 1. develop the Constructive element It is the need to understand and demonstrate how to take existing resources and content to create something new that benefits our learning.
- 3. refers to a fraudulent scheme or deceptive practice conducted online
- 4. refers to the right of individuals to control their personal information and data in the digital realm.
- 6. refers to a type of malicious software (malware) that is designed to replicate itself and infect computer systems, networks, and devices
- 7. the need to assess and review on our own competence with digital technologies
- 8. deliberate and malicious attempt to compromise, disrupt
- 9. develop the cognitive element by engaging with a wide range of operating systems, platforms, devices and software and looking for developmental and training opportunities that expose to digital or cyber tools.
- 11. Short for web browser
- 12. a popular digital music streaming service that provides users with access to a vast library of music, podcasts, and other audio content.
- 13. refers to any physical hardware component or electronic gadget that is used to perform specific functions, tasks, or operations.
- 15. The one who identify the several of the digital tools that can be used for educational purpose
- 17. pertains to the practices, measures, and awareness individuals need to ensure their security and well-being in the online environment.
- 19. develop an awareness of how digital environment can help people self-organize and foster links with local, national and global organizations.
- 20. individual who possess a range of digital skills
- 21. process of encoding information in such a way that only authorized parties can access and read it
- 22. refers to the virtual environment created by interconnected computer systems and digital networks
- 23. refers to data that has been processed, organized, and presented in a meaningful context for a specific purpose.
- 27. an individual with advanced technical skills and knowledge of computer systems, networks, and software who uses their expertise to gain unauthorized access to digital systems
- 29. type of cybercrime in which an individual’s personal information is stolen and used by someone else without their permission
- 30. collection of web pages that are typically related and interconnected by hyperlinks
- 31. in the digital world is defined as the qualities that a person is expected to have
- 32. cyber literacy also known as
- 33. digital information that is generated, processed, stored, and transmitted within computer systems, networks, and digital platforms.
- 35. this includes understanding the many different ways we can communicate with different devices, including mobile and other digital devices.
- 37. serve as a form of security measure to protect sensitive information
- 38. a popular online video-sharing platform that allows users to watch, upload, share, and comment on videos.
- 39. is used to describe technologies, systems, and processes that operate using digital data and electronic signals