Type
Crossword
Description

What should you do with your password? Safe
How should you keep your data? Secure
How should you look after your data? Private
How do you log on to your device and its your key? Password
What P is your data? Personal
Where do you save your photos? Cloud
If you have this you have a copy of your data Backup
What should you not do with your personal data? share
Finger print touch id
What should you do with your screen when your in a public place? Hide
What switch should you do to your computer every night? off

Computer Basics ! Crossword

Type
Crossword
Description

an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data Computer
any part of your computer that has a physical structure, such as the keyboard or mouse. Hardware
any set of instructions that tells the hardware what to do and how to do it Softwarwe
the metal and plastic box that contains the main components Computer Case
one of the main ways to communicate with a computer. Keyboard
another important tool for communicating with computers. Commonly known as a pointing device. Mouse
is used to print documents, photos, and anything else that appears on your screen. printer
is the computer's main circuit board motherboard
your system's short-term memory RAM
where your software, documents, and other files are stored hard drive
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language operating system
What id a shorter term for Wireless Internet Connection Wifi
is a type of software that allows you to perform specific tasks app
llows you to write a letter, design a flyer, and create many other types of documents word proccessor
the tool you use to access the Internet web browser
any type of software that is designed to damage your computer or gain unauthorized access to your personal information Malware
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second. speed
When you save a file, the data is written to the hard drive, which acts as long-term storage
is responsible for what you see on the monitor video card
also called an audio card—is responsible for what you hear in the speakers or headphones sound card

Computer Terms Word Search

Type
Word Search
Description

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

COMPUTER PARTS Crossword

Type
Crossword
Description

WHAT IS THE SCREEN OF A COMPUTER CALLED MONITOR
WHAT DO YOU TYPE ON TO MAKE WORDS APPEAR ON THE MONITOR KEYBOARD
WHAT DO YOU USE TO NAVIGATE AROUND YOUR COMPUTER MOUSE
WHAT DEVICE ALLOWS YOU TO MAKE A PAPER COPY OF THE INFORMATION ON YOUR COMPUTER PRINTER
WHAT DEVICE MAKES SOUND FROM YOUR COMPUTER AUDIBLE SPEAKER
WHAT IS A SET OF FACTS OR FIGURES SYSTEMATICALLY DISPLAYED, ESPECIALLY IN COLUMNS TABLE
WHAT PART OF A COMPUTER EXECUTES ALL GIVEN COMMANDS CPU
WHAT IS THE MOST PRIMARY PART OF A COMPUTER MOTHERBOARD
WHAT ALLOWS YOU TO TYPE ON THE KEYBOARD KEYS
WHERE ARE THE IMAGES YOU CHOOSE, OR WANT TO SEE, DISPLAYED SCREEN
WHAT TOOL(s) COMPRISES A COMPUTER SYSTEM HARDWARE
WHAT CATEGORY DOES GOOGLE FALL INTO BROWSER
WHAT ORGANIZES ALL OF YOUR COMPUTERS INFORMATION FOLDERS
WHAT CATEGORY DO COMMENTS/ OPINIONS FALL UNDER NOTES
WHAT REPRESENTS A COMMAND ON YOUR DEVICE ICON
WHAT WORD DESCRIBES RESTARTING YOUR DEVICE REBOOT
WHAT ITEM IS ESSENTIAL FOR CONNECTING EXTERNAL DEVICES TO YOUR COMPUTER USB
WHAT CIRCULAR DISK HOLDS LARGE AMOUNTS OF DATA DVD
WHAT WORD DESCRIBES HOW YOU WOULD ELECTRONICALLY RETREIVE DATA SEARCH

OPSEC is not Puzzling Crossword

Type
Crossword
Description

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

word processing crossword puzzle

Type
Crossword
Description

Makes the text appear thicker bold
you use command c in order to do it copy
to make changes to a photo crop
goes to the clipboard and remains there cut
to get rid of something delete
to make changes or corrections edit
is a button on the keyboard that performs operations when pressed with another key control
also known as return enter
the tab to the far left that allows you to save and print documents file
the way your text appears font
when your words appear slanted italic
what you use to type on keyboard
what you use to move your pointer around your screen mouse
to apply what you have copied paste
to keep something on your computer save
the process of highlighting your text select
what you use the longest bar on a keyboard for space

Ergonomics Crossword

Type
Crossword
Description

Sitting in an unnatural way for too long can cause an injury called ____ repetitive stress
Your behind should be in the _______ of the seat center
A small ____ can help support your right hand mouse
Position the monitor ___ inches away from your face 18-20 inches
It is a good idea to take a break every ___ when working on the computer 30 minutes
Sit so your elbows are at ___ angles 90 degree
Your legs should bend at the ____ knees
A ___ allows you a few use a few fingers instead of just one trackball
Start with your___ by focusing on something faraway eyes
You should not have to ____ to read what is on the screen lean in
Your wrists should be ____ not angled up or down straight
Your feet should rest on the ___ Floor
Fingers should rest ___ on the keys of the keyboard gently
If you feel you have to stretch your fingers to reach the keyboard, move it __) closer to you
Try to keep your fingers and wrists level with your ___ forearm
Doctors recommend only ___ hours of screen time a day 1-2
Position the screen at your ___ eyelevel
The top of the monitor needs to be level with your ___ forehead
Sit so your back ____ the seat back the whole time touches
The chair with a ___ can help lower-back support
Try not to ____ or lean slouch

INPUT AND OUTPUT DEVICES Crossword

Type
Crossword
Description

Allows you to produce a 'hard copy'. Printer
Allows just one person to hear audio output. Headphones
Can be a peripheral or inbuilt device allowing you to hear output audio. Speakers
Combines microphone and headphones to input and output audio data. Headset
A input device which is used to enter text. Keyboard
An input device which allows you to control a game. controller
Input device which allows you to input drawings Graphics Tablet
Input device which allows you to input audio. Microphone
Used to input visual data. Webcam
Input device controlled by fingers or stylus. Touch Screen
Pointing and inputting device. Mouse

Cyber Security Awareness Crossword

Type
Crossword
Description

Cyber security is a shared __________. Responsibility
This is commonly assigned to bank customers for use with ATMs and for use with debit cards. PIN
A malicious code that can infect your system. Virus
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineering
You should never share your __________. Password
A clean desk policy is important in order to protect __________ information from being revealed. Sensitive
You should _____ a device before stepping away from it. Lock
Any data that could potentially be used to identify a particular person. PII
You should be careful when downloading __________ because it could be malicious. Software
You should _____ your administrator if an incident occurs. Contact
For a password to be secure, it should contain upper and lower case letters, numbers, and __________. Symbols
It is important to have antivirus installed on your computer and on your _______. Smart phone
The "s" in _____ stands for secure and indicated that communications with a webpage is encrypted. HTTPS

HIPAA Crossword

Type
Crossword
Description

What act was passed in congress to protect individual's medical records and other personal health information HIPAA
Who is one person you can report a suspected breach to? SUPERVISOR
Is it ok, to discuss health information with an individual in an open area? NO
How should you send an email to outside recipients that contain protected health information? ENCRYPT
What HIPAA rule protects individual rights? PRIVACY
What is the acronym that identifies individual's information (ie: name, birthdate, address, etc.)? PHI
What is HIPAA's minimum training requirement for employees? ANNUALLY
Acronym for a document you receive from the physician office, which explains how they may use and share your health information NPP
What should you never share with another individual that is used to access systems? PASSWORD
How many days do you have to send a breach notification letter to individual(s), whose information was compromised? SIXTY