Across
- 2. - The trail of data you leave behind online
- 5. – A type of software license that restricts modification and redistribution
- 11. - A crime involving unauthorized access to computer systems
- 13. – A practice that involves reading someone’s private data without permission
- 14. - Legal rights granted to creators of original works
- 15. - A condition where a person is excessively dependent on the interne
- 17. – A negative health effect caused by excessive screen exposure
- 19. – A form of intellectual property that includes inventions and trademarks
- 20. - A practice to protect personal information online
Down
- 1. - A form of bullying using digital platforms
- 3. - A protocol used to secure private network connections
- 4. – A tool used to prevent unauthorized access to a network
- 6. – A method of disposing e-waste that involves material recovery
- 7. - A set of rules for proper online behavior
- 8. – A cybercrime involving fake websites and emails
- 9. - A person who gains unauthorized access to computer systems
- 10. - A deceptive technique used to steal personal information online
- 12. - Software that is free to use, modify, and distribute
- 16. - A law that governs digital transactions and cybercrime in India
- 18. - The act of copying someone’s work without credit
