Type
Word Search
Description

This word search contains the following answers:

haircut
destroy
girl
present
process
program
ready
seen
seven
surface
thirty
those
through
told

    Customize    

5th grade Wk 1 Word Search

Type
Word Search
Description

This word search contains the following answers:

exaggerate
competitor
peninsula
mistletoe
haircut
those
thirty
program
seven
seen
girl
destroy
surface
through
process
told
ready
present
word

    Customize    

Spelling List 1 Word Search

Type
Word Search
Description

This word search contains the following answers:

exaggerate
competitor
peninsula
mistletoe
haircut
those
thirty
program
seven
seen
girl
destroy
surface
through
process
told
ready
present

    Customize    

Computer Science Vocabulary Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A sequence of instructions suitable for processing by a computer. COMPUTERPROGRAM
The rules that govern the structure of language statements; in particular, the rules for forming statements in a source language correctly. SYNTAX
An error in the rules that govern the structure of language statements. SYNTAXERROR
A program that runs in the context of a browser. APPLET
A program that runs when translated by a Java computer. APPLICATION
Binary digit. The smallest unit of information for data storage and transmission. Each bit is considered to be either a "0" or a "1". BIT
A set of bits normally considered as a unit, it normally consists of eight bits and corresponds to a single character of information. BYTE
Hardware, software, or both, that allow a user to interact with and perform operations on a system, program, or other device. USERINTERFACE
A program that translates a program into machine code that can be converted into an executable program (an object program). COMPILER
An ordered set of well-defined instructions for the solution of a problem in a finite number of steps. ALGORITHM
Used to describe a complete data processing system, with the flow of data through clerical operations involved, down to the level of individual programs, but excluding such programs. FLOWCHART

    Customize    

spelling week 1 Word Search

Type
Word Search
Description

This word search contains the following answers:

exaggerate
competitor
peninsula
mistletoe
haircut
those
thirty
program
seven
seen
girl
destroy
surface
through
process
told
ready
present

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

5th grade Spelling Words Week 1 Word Search

Type
Word Search
Description

This word search contains the following answers:

exaggerate
competitor
peninsula
mistletoe
haircut
those
thirty
program
seven
seen
girl
destroy
surface
through
process
told
ready
present

    Customize    

Drivers Ed Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Contact between two or more vehicles Collision
Grooved surface of a tire that grips to the road Tread
Turning the steering wheel too much Oversteering
Not turning the steering wheel enough Understeering
Distance between vehicles Gap
Force keeping the tires from sliding Friction
Turning your vehicle around, then going the opposite way Turnabout
Two wheeled vehicle with a motor and pedal Moped
An eight sided sign that tells you to... Stop
Allowing others to go first Yeild
There are six _____ around the vehicle Zones
The first step in the IPDE process Identify
When stopping, you should see the persons ____ Tires
Percent of collisions that happen at intersections Thirty
When stopping, you should always check you ____ zone Rear
No blockages in your POT is a _____ zone Open
Any blockages in your POT is a _____ zone Closed
Teenagers have a different ___________ rythum than adults Circadian
A fixed object seen in the distance Target
Your vision from the side is your ______________ vision Peripheral
You put this on when making a turn Blinker
Driving is a ______ task Social
A flashing yellow light means Caution

    Customize    

Chap. 1 Java Vocabulary Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Programs that allow human users to accomplish specialized tasks. Application software
Uses mnemonic symbols to represent instructions and data Assembly language
Devices such as printers and scanners. Auxiliary inputoutput
Devices for long-term storage of data and programs, such as hard disks Auxiliary storage
A binary digit Bit
A sequence, consisting of 8 adjacent bits Byte
A major hardware component that consists of the arithmetic/logic unit and the control unit CPU
The actual computing machine and its support devices. Hardware
The principle of providing access to services but not to data resources. Information hiding
A list of data resources. Instance variables
Used for momentary storage of data and programs. Also called RAM. Internal Memory
Uses only binary digits, 1 and 0, to code programs. Also called first generation programming languages Machine language
Used to connect to the Internet, other computers and the rest of the world Network connection
A programming process in which a program is subdivided into objects ObjectOriented
Programs that give computer hardware system useful functionality Software
The process that a program goes through SDLC
The presence of computers, which are often hidden, in many items used in everyday life Ubiquitous computing
Supports moment-to-moment communication between a user and the compute User interface
A version of the software development life cycle (SDLC) consisting of six phases in which the results of each phase flow down to the next Waterfall

    Customize    

The Crucible Act 1 Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What is the Puritan's government? Theocracy
Who did John Proctor cheat on Elizabeth with? Abigail
Why is Elizabeth suspicious of John? Adultery
Who is the Barbados slave? Tituba
Who does Tituba accuse of witchcraft? Sarah Good
Where did The Crucible take place? Salem
People in Salem were afraid of what place? Forest
Who is the witchcraft expert? Hale
Who is worried about their wife reading books? Giles Corey
What were the girls doing in the forest? Dancing
Abigail drank _________ blood
Who currently works for the Proctors? Mary Warren
Who is Betty's dad? Thomas Putnam
How many babies did Mrs. Putnam lose? Seven
Who was seen running through the forest? Mercy Lewis
Discovered the girls in the forest Parris
Has 11 children and 26 grandchildren Rebecca Nurse

    Customize    

SERVSAFE CROSSWORD PUZZLE

Type
Crossword
Description

This crossword contains the following questions and answers:

An immersion probe is an example of a THERMOMETER
Hazards that make food unsafe are biological, physical and CHEMICAL
Reduces pathogens on a surface to safe levels. SANITIZING
The first-in, first-out system is known as this FIFO
Four types of pathogens that can contaminate food and cause foodborne illness are bacteria, viruses, fungi and PARASITES
The ice-point method or boiling-point method is used to do this CALIBRATE
Visible soil CLEAN
Worn when handling ready to eat foods GLOVES
Tiny, harmful lifeforms that cannot be seen, touched or smelled are known as PATHOGENS
Total seconds needed to properly wash hands TWENTY
Bacteria needs six conditions to grow. What is the abbreviation for them? FATTOM
This bacteria is linked to poultry and eggs, meat, and dairy products NONTYPHOIDALSALMONELLA
This bacteria is linked to ready-to-eat foods and beverages SALMONELLATYPHI
Raw or undercooked ground meat is linked to this bacteria... ECOLI
. Foods that are easily contaminated by hands, such as salads containing TCS food is linked to which bacteria? SHIGELLASPP

    Customize