Type
Word Scramble
Description

Technology
mouse
keyboard
laptop
code
hard drive
internet
web browser
bandwidth
modem
virus
firewall
hacker
ethernet
memory
software
Printer
Scanner
Folder
program

Computer Anatomy Word Search

Type
Word Search
Description

Browser
Application
Cable
Battery
power supply
Laptop
Desktop
output
input
headphones
floppy disc
Modem
RAM
Router
Power Point
Email
Word Processing
Spreadsheet
Microsoft
Internet
Ports
Start
Hard Drive
Webcam
Microphone
Flash Drive
CD Rom Drive
Scanner
Speaker
Printer
Mouse
Keyboard
Monitor
Memory Card
Central Processing Unit

Information Technology Word Search

Type
Word Search
Description

architecture
browser
cloudcomputing
database
datawarehouse
desktop
dvd
erp
ethernet
fddi
firewall
hardware
headset
hostedservice
infostructure
infrastructure
input
interface
keyboard
lan
laptop
mainframe
man
monitor
network
output
portal
printer
process
protocol
router
scanner
smartphone
software
speakers
spreadsheet
storage
stylus
switch
tablet
tcpip
topology
touchscreen
trackball
twan
usbstick
wan
wordprocessor

Computer Terms Word Search

Type
Word Search
Description

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

Technology Terms* Word Search

Type
Word Search
Description

APPLICATION
BOOT UP
COMPUTER
CPU
FILES
FOLDERS
FUNCTION
GRAPHICS
HARD DRIVE
HARDWARE
ICONS
KEYBOARD
LOG IN
MEMORY
MONITOR
MOTHERBOARD
MOUSE
MOUSE PAD
PRINTER
PROCESSOR
SHORTCUTS
SHUT DOWN
SOFTWARE
UPGRADE
USB PORT

Computer Science Vocab Word Search

Type
Word Search
Description

ZIP FILE
WINDOWS
BROWSER
WEB
VIRUS
USERNAME
USB
UPLOAD
HORSE
TROJAN
TERAFLOP
SPYWARE
SOUNDCARD
SMILEY
SERVER
SCROLL
SAVE
RESOLUTION
REBOOT
PRINTER
PORT
PERIPHERAL
PCI
PASSWORD
OPEN
NETIQUETTE
MULTIMEDIA
MODEM
MENU
LINUX
KEYBOARD
JPEG
JAVA
INPUT
HARDWARE
HACKER
GIGABYTE
FREEWARE
FONT
FIREWIRE
FAQ
ETHERNET
EMOTICON
DRIVER
DOWNLOASD
DOCUMENT
DISK
DESKTOP
DATABASE
CYBERSPACE
CRASH
CPU
COPY
CHIP
CACHE
BUG
BIOS
BANDWIDTH
ASCII

computer Word Search

Type
Word Search
Description

data
designer
digital
power point
access
word
excel
eathernet
windows
motherboard
codes
modem
cable
java
administrator
user
desktop
laptop
keyboard
mouse
games
disc drive
usb
spam email
pc
mac
network
skype
speakers
scanner
cpu
screen
monitor
image
internet
application
hardware
url
edit
save
megabyte
folder
output
virus
chip
text
google
jpeg
online
run

technology Word Search

Type
Word Search
Description

social network
software
monitor
cyberbully
modem
keyboard
hardware
mouse
network
firewall
Flash Drive
Personal Computer
email
network
dropbox
blog
technology
har drive
Operating System
digital citizenship

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Computer Basics ! Crossword

Type
Crossword
Description

an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data Computer
any part of your computer that has a physical structure, such as the keyboard or mouse. Hardware
any set of instructions that tells the hardware what to do and how to do it Softwarwe
the metal and plastic box that contains the main components Computer Case
one of the main ways to communicate with a computer. Keyboard
another important tool for communicating with computers. Commonly known as a pointing device. Mouse
is used to print documents, photos, and anything else that appears on your screen. printer
is the computer's main circuit board motherboard
your system's short-term memory RAM
where your software, documents, and other files are stored hard drive
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language operating system
What id a shorter term for Wireless Internet Connection Wifi
is a type of software that allows you to perform specific tasks app
llows you to write a letter, design a flyer, and create many other types of documents word proccessor
the tool you use to access the Internet web browser
any type of software that is designed to damage your computer or gain unauthorized access to your personal information Malware
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second. speed
When you save a file, the data is written to the hard drive, which acts as long-term storage
is responsible for what you see on the monitor video card
also called an audio card—is responsible for what you hear in the speakers or headphones sound card

Technology Crossword

Type
Crossword
Description

The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http