Puzzles and worksheets similar to Chapter 3 Storage Crossword

Digital Design Foundations Vocabulary Crossword

Type
Crossword
Description

particular size, weight and style of a typeface
exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
a small open-fronted hut or cubicle from which newspapers, refreshments, tickets, etc., are sold.
a large printed picture used for decoration.
moral principles that govern a person's behavior or the conducting of an activity.
an information system where documents and other web resources
videos created with original designs, drawings, illustrations or computer-generated effects that have been made to move in an eye-catching way
means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
assembly area where all the parts of a project are put together
any form of media that uses electronic devices for distribution
a picture, design, or the like, printed from an engraved or otherwise prepared block, plate, etc. an indentation, mark, etc
sound within the acoustic range available to humans.
digital optical disc data storage format
computer program that software developers use to create, debug, maintain, or otherwise support other programs and applications.

Cyber Awareness Month Crossword

Type
Crossword
Description

Something that shows up in a email
Hard to detect both by Users
Identity and Privacy Protection
Someone attempting to create Identity fraud
A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. Generally, a data breach results in internal data being made accessible to external entities without authorization.
A security tool, which may be a hardware or software solution that is used to filter network traffic.
A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
he likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware and spyware/adware.
The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or malicious attachments.
A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite. When the host file or MBR is accessed, it activates the virus enabling it to infect other objects. Most viruses spread through human activity within and between computers
a dishonest scheme; a fraud.
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
A form of malware that monitors user activities and reports them to an external their party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics. However, spyware can also be operated by attackers using the data gathering tool to steal an identity or learn enough about a victim to harm them in other ways.
An attack focusing on people rather than technology
Alerts used as a warning of danger.
an attempt by hackers to damage or destroy a computer network or system.
a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and .
the ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
Malware is defined as any device software that aims to cause damage and steal data. Malware is an abbreviation for malicious software. Ransomware and trojan, for example, are types of malware widely used in email attacks

Chapter 7&8 Crossword

Chapter 7&8 Crossword
Type
Crossword
Description

Measurement of the amount of time it takes the process to read data
Duplicate of a file, program, or disk placed on a separate storage
Process of writing on an optical disc
Drive that can read audio CDs and can write on, or record, CD-RWs
Device used to read and write data and information on tape
Storage device that typically uses flash memory
Hard disk that can be inserted and removed
a stripe that contains information identifying you and the card
Type of storage device that contains one or more inflexible, circular platters
Memory card capable of storing between 512 MB and 100 GB of data
storage over the internet
How much a storage device can hold
Removable flash memory device that can be used to add memory
Clearing everything from your storage drive
A small sheet of film, usually about 4 inches by 6 inches in size
Firmware that contains the computers start-up instructions.
CD that contains the files needed for the boot process
starting and initializing a computer system.
Process of turning on a computer that has been powered off completely
reorganizing a disk so that the files are stored in contiguous sectors
determines how a computer will communicate with a peripheral device
A location on disk where you can store files.
version of the Macintosh operating system
**********
Filtering program that stops pop-up ads
A program advertised as performing one activity but actually doing something else.
Process of using the operating system to restart a computer.
.zip extension.
blocks you from potentially fraudulent web sites
a firewall specifically designed for you

Wearable Crossword

Type
Crossword
Description

Technology worn on your body
The NHS provide this service for people.
a person who has the job of watching or noticing particular things.
the act of stopping something from happening or of stopping someone from doing something.
a system that can show the exact position of a person or thing by using signals from satellites
the use of computers to design objects
Short for computer-assisted manufacturing.
a condition or situation that causes problems, especially one that causes something or someone to be less successful than other things or people:
a device that is used to record that something is present or that there are changes in something.
a set of images and sounds, produced by a computer, that seem to represent a place or a situation that a person can take part in
a device containing a wheel that spins freely within a frame, used on aircraft and ships to help keep them horizontal, and as a children's toy
images produced by a computer and used together with a view of the real world
a device that measures acceleration or G-force
you can wear me round your wrist to monitor your health and I rhyme.

COM Crossword

COM Crossword
Type
Crossword
Description

Business that provides access to the Internet free or for a fee
Protects a computer against viruses
Duplicate of a file, program, or disk; stored separately
Internet service that provides hard disk storage to computer users
Hardware component that enables a computer to send and receive data
Electronic device operating via instructions stored in its own memory
Directs and coordinates most of the operations in the computer Collection of unprocessed items
Designed so the system unit and all devices fit entirely on a desk
Device that allows users to take pictures and store the images digitally
Visually conveys text, graphics, and video information
Reducing electricity and environmental waste due to computers
Storage device that contains one or more inflexible, circular platters
Flash memory storage device that plugs into a USB port
Small, flat, rectangular pointing device near the keyboard that allows you to move the pointer by sliding a fingertip on the surface of the pad
Typically has a touch-sensitive screen between seven and ten inches, and is extremely lightweight
Allows users to create worksheets and perform calculations
Phone that can connect to the Internet
Malicious program that allows someone to take control of computer
Number of horizontal and vertical pixels in a display device
Computer viruses, worms, Trojan horses, and rootkits

Secondary Storage Devices Word Search

Secondary Storage Devices Word Search
Type
Word Search
Description

Magnetic Storage Devices
Optical Storage Devices
Flash Memory Devices
Online and Cloud
Floppy Diskette
Magnetic strip
Cloud storage
Network media
Tape cassette
Blu-ray disk
Memory stick
Zip diskette
Flash drive
Memory card
Hard drive
Super disk
DVD
SSD
CD

Computer Memory Project Crossword

Computer Memory Project Crossword
Type
Crossword
Description

What is a computer disk drive that reads and writes data from optical disks through laser beaming technology? (7,4,5)
What type of storage device uses a magnetisation process to write, rewrite and access data?(8,4)
A flash device that contains no mechanical parts?(5,5,4,5)
a portable storage device that uses flash memory and is lightweight enough to attach to a key chain.(3)
What type of memory stores data and machine code currently being used?(3)
A form of data storage that is non-volatile and easily altered or reprogrammed?(3)
Type of disk storage composed of a disk of thin and flexible magnetic storage?(6,4)
Type of storage online but it is physically kept in multiple servers.(5,7)
The main memory in a computer?(7,7)
A non-volatile storage that is not directly accessed by the CPU?(9,7)

1.02 Vocabluary Crossword

1.02 Vocabluary Crossword
Type
Crossword
Description

A device such as a wireless router, that allows wireless devices to connect to a network.
A device that reads and or writes data to a disk
Software program that runs on your computer. "program"
Central Processing Unit
Spindle of Magnetic disks called platters
Stores all your data. Houses the hard disk
Opposite of Software
Communications device that can be external or internal.
The main circuit board of your computer that connects essential internal components together to allow everything in your computer to work together.
Any external device that provides input and output for the computer.
Hardware component that supplies POWER to an electrical device
Random Access Memory
Read-Only Memory
Files and Programs that make up your computers operating system.
Universal Serial Bus, most common port used in todays computers.
Used to process the graphics portion of the processing load of the CPU

HOUSE AND HOME Crossword

Type
Crossword
Description

Where do I wash my body?
I need to sleep. Where do I do this?
What is the light called on my desk?
What do I use when I am online playing a game with my friends?
Where in the kitchen do we store milk?
Where do I sit when I study or write a letter?
Where do I release excess fluids from my body?
What do I use to unlock my front door to our house?
Where do I keep all my story books?
What device is used to tell the time of day?

MANAGING INFORMATION AND CHANGE IN A CONNECTED WORLD Crossword

MANAGING INFORMATION AND CHANGE IN A CONNECTED WORLD Crossword
Type
Crossword
Description

What is it called where a specific location where memory and data is stored?
What is an online area provided by an online service or an Internet host ?
What is a electronic device capable interpreting and executing program instructions?
What is a computer application in which data is organized and stored ?
A text , voice , or video message sent or received remotely, over a computer network or the system by which such a message is sent
A secondary storage device capable of recording information to and reading information from a small disk placed inside the device
Connected to a network such as the Internet
A computer chip or group of chips containing the temporary , or volatile , memory in which programs and data are stored.
A software program that enables you to search for locate and retrieve specific information on the Internet
An electronically controlled component used to enter alphanumeric data
A number system with a base of 2
A software application that enables a person to access sites on the World Wide Web
The part of a computer that interprets and carries out instructions that operate the computer and manages the computer's devices and resources
A frequency of one billion times a second
Unit of memory equal to 1,073,741,824 bytes
A personal computer small enough to fit into a person's hand
A device for reading and writing to the magnetic storage medium known as a hard disk
All physical components that comprise the system unit and other devices connected to it, such as a keyboard or monitor
A unit of measure that refers to the number of cycles per second
Unit of memory equal to 1,048,576