Type
Crossword
Description

This crossword contains the following questions and answers:

An image or user name that represents a person online. Avatar
The denial of access to particular parts of the internet. Blocking
Interactive web journal or diary posted online. Blog
Repeated and deliberate harassment directed at another person. Bullying
Intentional & repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Cyberbullying
Suicide caused directly or indirectly from cyberbullying. Cyberbullicide
Repeated harassment using electronic devices and networked technology that includes threats of harm. Cyberstalking
Evidence of a person's use of the internet. Digital Footprint
Intentionally excluding someone from an online group, like a buddy list or a game. Exclusion
The act of restricting access to certain websites. Filtering
Hardware or software that restricts and regulates incoming and outgoing data to or from computer systems. Firewall
Online fights using electronic messages with angry and vulgar language. Flaming
Repeatedly sending offensive, rude, or insulting messages. Harassment
Breaking into someone's account, posing as that person and sending messages to make the person look bad. Impersonation
An image with text used to describe a thought, idea, or joke that is widely shared. Meme
The one who instigates online social cruelty. Also know as the aggressor. Offender
Sharing someone's secrets or embarrassing information online. Outing
Software or a website that allows one's internet connection to be routed or tunneled through a different connection or site. Proxy
Making a statement or taking an action that indicates harm to another. Threat
A person who is known for creating controversy in an online setting. Troll
The person who is on the receiving end of online social cruelty Victim

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

controlled by or connected to another computer or network online
working surface of a desk desktop
legal right given to an originator to print, publish, perform, film, or record the originator's work. copyright
any message passed through digital devices. digital communication
where computer networkers where users can communicate. chat room
regularly updated website or web page, typically one run by an individual or small group blog
capable of copying itself and destroying data. virus
electronic communication used to bully a person or a group of people. cyberbullying
applications that enable users to create and share content or to participate in social networking. social media
set of rules you should follow in order to make the internet better for others, and better for you. digital etiquette
acquisition and use of a person's private identifying information identity theft
A hostile, strongly worded message that may contain obscene language. flame
specific features or software that parents manage the online activities of children parental control
any device used to communicate provocative messages and/or sexual images sexting
A program, or set of instructions, that runs on a computer. software

    Customize    

Digital Citizenship Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

communication including television, radio, and newspapers, that often reaches and impacts a large audience media
electronic devices and media platforms such as computers, cell phones, the Internet that allow users to communicate and interact with one another or with the device or application itself digital media
two or three dimensional icon that represents a compute user or a gamer avatar
the act of saying mean things online usually in ALL CAPS Flaming
remix or blend of multiple songs, videos, or other media content into one product Mash up
downloadable video or audio file. podcast
the illegal act of sending emails or messages that appear to come from authentic sources but really come from spammers. phishing
an attempt to trick someone, usually with the intention of stealing money or private information scam
a type of crime in which your private information is stolen and used for criminal activity identity theft
in a position that makes it easier for you to be harmed or attacked vulnerable
someone who sees cyberbullying but does nothing to help bystander
someone who helps when they see cyberbullying occur upstander
to imagine the feelings that someone else is experiencing empathize
bombarding someone with messages over digital media. repeated contact when it is least expected harassing
using fake names, posing as someone else, or creating a fake profile about someone else deceiving
a verbal attack targeting someone because of their race gender, religion or sexual orientation hate speech
a person who is the object of an intentional action target
a person who has malicious intents to hurt or damage someone offender
to increase or make intense escalate

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A form of malicious code that displays unsolicited advertising on your computer. Adware
A saved link to a website that you can click on rather than retyping the web address. Bookmark
A program that les you find, see, and hear material on web pages. Browser
A Friends a user interacts with online through various media such as instant message and chat. Buddies
A location online that allows multiple users to communicate electronically with each other in real time. Chatroom
A piece of information about your visit to a website that some websites record automatically on your computer. Cookie
People who willfully and repeatedly inflict harm through the medium of electronic text such as emails, blogs, or social network posts. Cyberbullies
To copy a file from one computer system to another via the internet. Download
Allows you to block certain types of content from being displayed. Filtering
A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer. Firewall
Participating in internet games which can be played individually or by multiple online users at the same time. Gaming
A tracking feature of Internet browsers that shows all the recent websites visited. History
The site that is the starting point on the web for a particular group or organization. Homepage
Private, real-time text conversation between two users (2 words). Instant Messaging
Stands for malicious sofware or code, that is designed to damage the computer or collect information. Malware
The act of parents tracking the websites or e-mail messages that a child visits or reads. Monitoring
Rules or manners for interacting courteously with others online. Netiquette
Specific features or software that allow parens to manage the online activities of children (2 words). Parental Controls
A secret word or number tha must be used to gain access to an online service. Password
A type of online fraud, where someone tries to trick the victime into revealing sensitive details. Phishing
Online communities where people share infomration about themselves (2 words). Social Media
Any unsolicited e-mail, or junk mail. Spam
A wide variety of software installed on people's computers, which collects information about you withour knolwedge or conesnt and sends it back to whoever wrote the program. Spyware
Browsing around various websites following a particular personal interest. Surfing
To send information from your computer to another computer. Upload
The name a suer selects to be identified on a computer, network, or in an online gaming forum. Username
A software program that typically arrives through email attachments and quickly exhausts the computer's memory. Virus

    Customize    

Cyberbullying Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Popular app used for cyber bullying snapchat
Posting embarrassing photos of someone is a form of...? cyberbullying
Repeated harassment using electronic devices and networked technology that includes threats of harm. cyberstalking
Repeatedly sending offensive, rude, or insulting messages. Harassment
The one who instigates online social cruelty. Also know as the aggressor. offender
The person who is on the receiving end of online social cruelty victim
A person who is known for creating controversy in an online setting. troll
A popular videosharing website youtube
A person who witnesses cyberbullying without doing anything. bystander
If you are being cyberbullied, it is important that you never do this toward the person who bullied you... retaliate
Re-think before you do this.... post

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Digital Literacy Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

electronic devices and media platforms such as computers, cell phones, video, the Internet, and video games that allow users to create, communicate, and interact with one another or with the device or application itself digital media
a figure of speech in which a comparison is made between two different things using the word like or as simile
navigating the digital world safely, responsibly, and ethically digital citizenship
a representation of someone or something, such as a photograph or drawing; the way someone or something is perceived by others image
a rule that is unfairly applied to different people or groups of people double standard
a set of principles and morals governing people’s behavior, including honesty and respect toward others ethics
a set of principles and morals governing people’s behavior as it relates to the Internet and digital devices online ethics
to depict yourself to others as being a certain way or having particular characteristics represent
an image and personality that you show to others persona
a graphic image that represents a person online avatar
without a name or other information that identifies who you are anonymous
the effect of something that happened earlier consequence
all of the information about a person that can be found online digital footprint
to let in or to be given entrance admission
someone seeking entrance to a school or placement in a job, usually competing with others for the position candidate
the general impression of a person held by others and the public reputation
to continue and endure persist
different factors that surround a piece of information that help determine its meaning context
a person or company other than you and the owner of the website you visit third party
choices a website might give you about what it does with your information privacy options
when companies collect information about you based on your online behavior track
when companies tailor content to you based on the information they have collected about you target
common categories of the population, such as age, gender, and race demographic
data files that are stored on your computer when you visit certain sites, often used by companies to identify repeat customers and personalize visitors’ experiences cookies
knowledge collected from many people towards a common goal collective intelligence
a website created by a group that allows all users in a group to add or edit content wiki
the ability to use a small amount of someone’s creative work without permission, but only in certain ways fair use
a use in connection with a business, usually for profit commercial purposes
a law that protects a creator’s ownership of and control over the work he or she creates, requiring other people to get the creator’s permission before they copy, share, or perform that work copyright
creative work that’s not protected by copyright and is therefore free for one to use however one wants public domain
an idea –whether a phrase, expression, image, or video – that gains widespread recognition online viral: the rapid spread of information, particularly meme
the view or outlook of someone, based on their thoughts, feelings, experiences, and background perspective
a person who is the object of an intentional action target
a person who intentionally commits acts to hurt or damage someone offender
a person who passively stands by and observes without getting involved bystander
a person who supports and stands up for someone else upstander
to increase or make more intense escalate
to decrease or make less intense de-escalate

    Customize    

Cyber Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

    Customize    

Computer Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Small circuit board that controls processing within a computer microprocessor
Physical parts of a computer Hardware
A program that contains instructions for a computer Software
Applications are also known as Apps
Consists of information Message
Refers to the method used to enter or transmit your message to a computer Input
Information or data retrieved or received from a computer Output
"Brain of the computer" CPU
Input/Output device that reads data from and writes data to a disK Diskdrive
Output device that displays text and graphics on a screen Monitor
Input device used for commands and navigation Mouse
Input device with an arrangement of letters, etc. Keyboard
First line of defense Password
An unauthorized user able to access and misuse information Hacker
A destructive program loaded onto a computer Virus
Defamation by written or printed words or pictures Libel
Defamation by oral utterance Slander
A program that allows users to view web pages and online information Browser
Sotware that has been written to detect, isolate, and destroy viruses Antivirusprogram
A web address URL
Any word, phrase, or picure that, when clicked, take the user to another location Hyperlink
Electronic mail Email
Playing video and sound in real time Streaming
Retrieving somehting fromt he internet and storing it on a disk drive Downloading
Using material antoher person has created and claims it as your own Plagiarism

    Customize