0% found this document useful (0 votes)
291 views

Internet Safety - Crossword Puzzle

This document is an internet safety crossword puzzle with clues about key computer security terms. It contains 10 clues across and 8 clues down related to topics like encryption, firewalls, viruses, malware, and digital signatures. Students are instructed to solve the puzzle by filling in the answers on an online survey form.

Uploaded by

icq4joy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
291 views

Internet Safety - Crossword Puzzle

This document is an internet safety crossword puzzle with clues about key computer security terms. It contains 10 clues across and 8 clues down related to topics like encryption, firewalls, viruses, malware, and digital signatures. Students are instructed to solve the puzzle by filling in the answers on an online survey form.

Uploaded by

icq4joy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Internet Safety Quiz - Crossword Puzzle

1S E U I T 2F
C R Y
I I

G
R
3P O 4T E C
N R T S E
H W
A
5T O J A N 6
T R A E Y
U 7V L
E
I A 8w L
R
9E R p I O
N C Y T N
U
S R
10M A O U
S L A C I S
ACROSS

1. In the computer industry, it refers to techniques for ensuring that data stored in a computer cannot be
read or compromised by any individuals without authorization.

3. To guard or defend from danger.

5. A destructive program that masquerades as a benign application.

6. The condition of being free from danger or risk.

9. The translation of data into a secret code.

10. It is a software system that is intended to cause undesired effects, or damage to a system.

= TO BE CONTINUED BELOW =
DOWN

1. It is used to authenticate the identity of the sender of a message to ensure that the original content of the
message that has been sent is unchanged.

2. A system designed to prevent unauthorized access to or from a private network.

4. Occurrence of any events that causes undesirable impact on the business.

7. A program or piece of code that is loaded onto your computer without your knowledge and runs against
your wishes.

8. A program that replicates itself over a computer network and usually performs malicious actions, such as
using up the computer’s resources and possible shutting the system down.

INSTRUCTION
Please fill up the answers into the survey given in this link:
http://sinwebs302:1000/DYO_HSE/Lists/Internet%20Safety%20Quiz%20by%20DYO%20%20Day
%205/overview.aspx

You might also like