Internet and Viruses Word Search

Created
May 11, 2015
Type
Word Search
Description

This word search contains the following answers:

DNS
antivirus software
worm
trojan horse
boot sector virus
file virus
logic bomb
time bomb
trigger event
spyware
adware
virus
cookies
upload
download
favorites
homepage
Browser

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

More Crosswords, Word Searches, and Puzzles

Cyber Security Crossword

Created
Apr 25, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Science Vocab Word Search

Created
Mar 7, 2017
Type
Word Search
Description

This word search contains the following answers:

ZIP FILE
WINDOWS
BROWSER
WEB
VIRUS
USERNAME
USB
UPLOAD
HORSE
TROJAN
TERAFLOP
SPYWARE
SOUNDCARD
SMILEY
SERVER
SCROLL
SAVE
RESOLUTION
REBOOT
PRINTER
PORT
PERIPHERAL
PCI
PASSWORD
OPEN
NETIQUETTE
MULTIMEDIA
MODEM
MENU
LINUX
KEYBOARD
JPEG
JAVA
INPUT
HARDWARE
HACKER
GIGABYTE
FREEWARE
FONT
FIREWIRE
FAQ
ETHERNET
EMOTICON
DRIVER
DOWNLOASD
DOCUMENT
DISK
DESKTOP
DATABASE
CYBERSPACE
CRASH
CPU
COPY
CHIP
CACHE
BUG
BIOS
BANDWIDTH
ASCII

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Internet Safety Word Search

Created
May 14, 2015
Type
Word Search
Description

This word search contains the following answers:

meet online
family values
uncomfortable
parent permission
responsible
school students
kids rules
younger children
telephone number
posting pictures
technology
online citizen
downloading
tell parents
trust
personal files
public place
passwords
nostrangers
antivirus software
home computer
cyber citizen
Personal Information
Internet Safety

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Technology Crossword Puzzle

Created
Aug 4, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Terms Word Search

Created
Apr 12, 2016
Type
Word Search
Description

This word search contains the following answers:

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Internet Safety Crossword

Created
Apr 5, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

A form of malicious code that displays unsolicited advertising on your computer. Adware
A saved link to a website that you can click on rather than retyping the web address. Bookmark
A program that les you find, see, and hear material on web pages. Browser
A Friends a user interacts with online through various media such as instant message and chat. Buddies
A location online that allows multiple users to communicate electronically with each other in real time. Chatroom
A piece of information about your visit to a website that some websites record automatically on your computer. Cookie
People who willfully and repeatedly inflict harm through the medium of electronic text such as emails, blogs, or social network posts. Cyberbullies
To copy a file from one computer system to another via the internet. Download
Allows you to block certain types of content from being displayed. Filtering
A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer. Firewall
Participating in internet games which can be played individually or by multiple online users at the same time. Gaming
A tracking feature of Internet browsers that shows all the recent websites visited. History
The site that is the starting point on the web for a particular group or organization. Homepage
Private, real-time text conversation between two users (2 words). Instant Messaging
Stands for malicious sofware or code, that is designed to damage the computer or collect information. Malware
The act of parents tracking the websites or e-mail messages that a child visits or reads. Monitoring
Rules or manners for interacting courteously with others online. Netiquette
Specific features or software that allow parens to manage the online activities of children (2 words). Parental Controls
A secret word or number tha must be used to gain access to an online service. Password
A type of online fraud, where someone tries to trick the victime into revealing sensitive details. Phishing
Online communities where people share infomration about themselves (2 words). Social Media
Any unsolicited e-mail, or junk mail. Spam
A wide variety of software installed on people's computers, which collects information about you withour knolwedge or conesnt and sends it back to whoever wrote the program. Spyware
Browsing around various websites following a particular personal interest. Surfing
To send information from your computer to another computer. Upload
The name a suer selects to be identified on a computer, network, or in an online gaming forum. Username
A software program that typically arrives through email attachments and quickly exhausts the computer's memory. Virus

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Internet Safety Crossword

Created
Feb 22, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Cyber Security Crossword

Created
Mar 23, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

key words Word Search

Created
May 23, 2017
Type
Word Search
Description

This word search contains the following answers:

Worm
Adware
spyware
trojan horse
phising
Think you know
encryption
internet safety
e-safety
Anti virus
password
Firewalls
VPN
child line
virus
spam

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Networks Crossword

Created
Oct 19, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

What is it called when computers and other devices that are connected to share hardware, software, and data? Computer Network
A real time, face to face meeting between individuals not in the physically in the same place is called? Videoconference
A phone, such as a cellular or satellite phone, that uses a wireless network. mobile phone
The act of working from a remote location bu using computers and networking technology. telecommute
The use of networking technology to provide medical information and services telemedicine
A network that uses a central device connected directly to several other devices star network
In a client-server network, a computer that is dedicated to processing client requests. server
A location that provides wireless Internet access. hotspot
A network in which computers and other devices are connected to the network via physical cables Wired Network
A network in which computers and other devices are connected without physical cables Wireless Network
A network that uses a central cable to which all network devices connect. Bus Network
In a client server network, a computer or other device that requests and uses network resources. Client
To retrieve files from a server download
to transfer files to a server upload
a private network that is set up similarly to the internet and is accesses via a Web browser Intranet
The amount of data that can be transferred, such as via a bus or over a networking medium, in a given time period. bandwidth
An intranet that is at least partially accessible to authorized outsiders. Extranet
The amount of data that is transferred under real life conditions. Throughput
A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient. Broadcasting
A networking standard for very short-range wireless connections Bluetooth

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying