Type
Crossword
Description

Process of identifying conflicts and issues through 3D collaboration and co-ordination. ----- (5) detection. Clash
The act of retrospectively applying a BIM process to an existing project. ------ (6) bimify
BIM ---- (4). The act of deliberately or intentionally overinflating a person or organisation’s BIM ability. wash
A piece of data that defines a property or characteristic of an object, element or file. --------- (9) Attribute
The Internet of ------ (6). The concept of everyday physical objects that are connected to the internet and have the ability to identify themselves to other devices. Things
This kind of model consists of linked individual models and other information to create a single model of the asset. --------- (9) Federated
A neutral, non-proprietary data schema developed by buildingSMART to define, describe, exchange and share information. --- (3) ifc
The collective term used to describe level of detail and level of information. Level of ---------- (10). definition
A collection of data exported from the BIM at a particular stage in a particular format and in level of definition. Data ---- (4) drop
A shared generic framework for the key project stages where the project team can assign roles and responsibilities. Plan of ----- (5) works
Clear questions that the client asks the supply chain during the key stages of a project. ----- (5) Language Questions. Plain
This kind of design is about using rule-based relationships between intelligent objects that enable the project team to update related properties when one property changes. ---------- (10) modelling. parametric
Simulation of the construction process using computerised models and techniques. ------- (7) design and construction. virtual
Collection of reusable predefined assets such as objects, material and textures that can be imported into a BIM platform. ------- (7). library
A document prepared by individual teams containing a federated list of information deliverables for each task including format, date and responsibilities. ---- (4). tidp
A single source of information, such as a project extranet where project information is collected and shared among the project team. The common ---- (4) environment. data
A tangible or intangible quantifiable outcome that’s provided to a receiving party. ----------- (11) deliverable
Delivering the UK’s Level 3 Strategic Plan – Digital Built ------- (8). britain

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Technology Crossword Puzzle

Type
Crossword
Description

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

Technology Crossword

Type
Crossword
Description

The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http

Computer Terms Crossword

Type
Crossword
Description

is the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills Digital Literacy
a computer designed for use by one person at a time. Personal Computer
is the collection of physical parts of a computer system. Hardware
is a generic term for organized collections of computer data and instructions Software
one of the most essential parts of a computer system. Motherboard
A central processing unit CPU
refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. Back Up
The primary computer storage device, which spins, reads and writes one or more fixed disk platters. Hard Drive
Short for digital versatile disc or digital video disc DVD
a device or program that enables a computer to transmit data over Modem
a widely used sans-serif typeface developed in 1957 by Swiss typeface designer Max Miedinger Helvetica
Universal Serial Bus USB
The global communication network that allows almost all computers worldwide to connect and exchange information. Internet
providing a common topic identifier in text and chat messages so they can be searched as a group. Commonly used in tweets hashtag
connects to the motherboard of a computer system and generates output images to display. Video Card

Digital Technology Crossword

Type
Crossword
Description

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

MS Access Crossword Puzzle

Type
Crossword
Description

column in a table that contains a specific piece of information within a record. Field
collection of organized data that allow access, retrieval, and use of that data Database
Small box or bar that selects the entire row when clicked Row Selector
A collection of rows and columns Data Sheet
Row in a table that contains specific information about a person, product, or event Record
A object Is Not A Type Of Microsoft Access Database Object Worksheets
The Key Uniquely Identifies Each Record PrimaryKey
Enables You To View Data From A Table Based On A Specific Criterion Query
In the context of databases, a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table. Relationship
It is a database management system (DBMS) based on the relational model. RDBMS
An object which stores data in rows and columns. Table
The basic elements of a form or a report are called: Controls
Type of control box which is most often associated with a bound control. TextBox

Computer Science Vocabulary Crossword

Type
Crossword
Description

A sequence of instructions suitable for processing by a computer. COMPUTERPROGRAM
The rules that govern the structure of language statements; in particular, the rules for forming statements in a source language correctly. SYNTAX
An error in the rules that govern the structure of language statements. SYNTAXERROR
A program that runs in the context of a browser. APPLET
A program that runs when translated by a Java computer. APPLICATION
Binary digit. The smallest unit of information for data storage and transmission. Each bit is considered to be either a "0" or a "1". BIT
A set of bits normally considered as a unit, it normally consists of eight bits and corresponds to a single character of information. BYTE
Hardware, software, or both, that allow a user to interact with and perform operations on a system, program, or other device. USERINTERFACE
A program that translates a program into machine code that can be converted into an executable program (an object program). COMPILER
An ordered set of well-defined instructions for the solution of a problem in a finite number of steps. ALGORITHM
Used to describe a complete data processing system, with the flow of data through clerical operations involved, down to the level of individual programs, but excluding such programs. FLOWCHART

Information security crossword puzzle

Type
Crossword
Description

Is a technique that is used to exploit a vulnerability in any application attack
gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Vulnerability
potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. risk
People, property, and information that needed to be protected asset
Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset threat
Occurs when the system is vulnerable to attacks intrusion
process to retrieve vital data from a crashed system or data storage devices recovery
Occurs when a user/machine is discovered trying to access unauthorized data detection
the action of stopping any form of attack from happening prevention
the process of determining what rights and privileges a particular entity has authorization
Is the process of determining and assigning privileges to various resources, objects or data access control
the process of tracking recording system activities and resource access accounting
the part of accounting in which a security professional examines logs of what was recorded. auditing
Are physical or virtual objects, such as smart cards, ID badges, or data packets, that store authentication information• tokens
Are authentication schemes based on the identification of individuals by their physical characteristics biometrics
the science of hiding information cryptography
the original message plaintext
the encoded message ciphertext
info used in cipher only to sender/receiver key

Cybersecurity Worksheet

Type
Matching Worksheet
Description

Something or someone that may result in harm to asset threat
Probability of a threat exploiting a vulnerability risk
A weakness that threatens the confidentiality, integrity, or availability (CIA) of an asset Vulnerability
Tool or technique that takes advantage of a vulnerability Exploit
Process of identifying, assessing, and reducing risk to an acceptable level Risk management
Security feature designed to restrict who has access to a network, IS, or data. Access control
The process of generating, recording, and reviewing a chronological record of system events to determine their accuracy Audit
Transforming data into scrambled code to protect it from being understood by unauthorized users Encryption
Readable text Plaintext
Encrypted text Ciphertext
Software or hardware device that controls access to a private network from a public network (Internet) by analyzing data packets entering or exiting it Firewall
The ability of an IS to continue to operate when a failure occurs, but usually for a limited time or at a reduced level Fault tolerance

Computer Crossword Puzzle

Type
Crossword
Description

A screen that displays an image that is being generated by a computer. monitor
The set of keys that are used to type words on a computer or typewriter. keyboard
A small device that is connected to a computer that you move with your hand to help you click on items on the computer screen. mouse
A machine that is used for printing documents, pictures, etc. printer
An electronic device that can intensify speeches, music, etc., and made audible throughout a room, hall, or the like. speaker
A set of facts or figures that can be displayed through a computer, especially in columns. table
or the Central Processing Unit is the component of a computer system that processes and exchanges data with the peripherals. CPU
The main circuit board of a computer that holds together many of the important components of a computer. motherboard
are on a keyboard to help you enter information on the computer. Keys
where you can find the images on your electronic device. Screen
where you can find the physical components of an electronic device. hardware
a computer program where you can look up and information on the internet. Browser
A group of files or documents that are stored together by a title on your computer. folders
A brief comment or explanation. notes
A small picture on a computer screen that represents a program or function that can be opened. icons
Booting a computer system again usually due to a problem. reboot
A special kind of cord that enables you to connect a computer to another device. USB
An disk that contains usually a video recording or computer data. DVD
To look up something. search