Page 78 - Cyber Safety C-8
P. 78
21 st
Century #Critical Thinking
Skills
Solve the crossword!
ACROSS
4. The information that relates to an individual and can be used to identify them.
5. Turning a message into a secret code that only the intended receiver can read.
DOWN
1. It is the process of converting encrypted data back into its original, readable form.
2. Individuals or groups who engage in illegal activities online.
3. An app that shares profile photo, name, last seen, and status with others. If not restricted,
strangers can misuse this information.
1
D
2
C
3
W
4
P
N
P
5
E N
S
76 Computer Science - VIII

