Page 78 - Cyber Safety C-8
P. 78

21 st
                                                                                             Century   #Critical Thinking
                                                                                              Skills



                  Solve the crossword!
                  ACROSS
                  4.  The information that relates to an individual and can be used to identify them.

                  5.  Turning a message into a secret code that only the intended receiver can read.
                  DOWN

                  1.  It is the process of converting encrypted data back into its original, readable form.
                  2.  Individuals or groups who engage in illegal activities online.
                  3.  An app that shares profile photo, name, last seen, and status with others. If not restricted,
                     strangers can misuse this information.


                                                          1
                                                           D
                                                                   2
                                                                    C


                                                                                                           3
                                                                                                           W



                                                          4
                                                           P








                                                          N

                                                                                                            P
                           5
                            E                                      N






                                                                   S
















                   76   Computer Science - VIII
   73   74   75   76   77   78   79   80   81   82   83