Type
Crossword
Description

A roman move caesar shift
Enigma machine, reverse engineered BOMBA
Contains the worlds largest historical working computer equipment block H
a rebuild of the worlds first large scale semi programmable digital electronic computer Colossus
Its called Bletchley Park or..... Station X
German cipher (named after company) Lorenz Cipher
Head of MI6 Admiral............. purchaser of Bletchley Park Hugh Sinclair
................... cracked the code of the enigma machine Alan Turing
seemingly unsolvable encryption machine Enigma machine
machine used to crack the Enigma,named in honour of the BOMBA Bombe

Computer Science Word Search

Type
Word Search
Description

alan turing
algorithm
black hat
bletchley park
bombe
brute force
cipher
colossus
Computer Misuse Act
enigma
fancy bears
flow chart
function
hexadecimal
iteration
phishing
pseudocode
Python
selection
SQL injection
white hat

Imitation Game Word Search

Type
Word Search
Description

visionary
cryptograher
inventor
autism
cyanide
Bletchley
homosexual
decoder
Game
Imitation
professor
computation
cipher
prejudice
mathematics
intelligence
secrecy
persecution
closeted
castration
chemical
encryption
enigma
cryptology

Python Crossword

Type
Crossword
Description

Personal Digital Assistant PDA
A person who writes computer programs Programmer
Programming Language Python
Represented all in zeros and ones Machine Language
Reads the source code of the program as written by programmers Interpreter
Text editor to write instructions into a file Script
Sequence of Python states that have been crafted to do something Program
Perform some set of statements repeatedly, usually with some variation Repeated Execution
Get data from the “outside world”. Input
Display the results of the program on a screen or store them in a file Output
Perform statements one after another in the order they are encountered in the script. Sequential Execution
Check for certain conditions and then execute or skip a sequence of statements Conditional Execution
when your program has good syntax but there is a mistake in the order of the statements Logic Errors
A property of a program that can run on more than one kind of computer Portability
An instruction that causes the Python interpreter to display a value on the screen Print Statement
The process of formulating a problem, finding a solution, and expressing the solution Problem Solving
A set of instructions that specifies a computation Program
When a program displays a message and pauses for the user to type some input to the program Prompt
Stores programs and data and retains its information even when the power is turned off. Secondary Memory
The meaning of a program Semantics
An error in a program that makes it do something other than what the programmer intended Semantic Error
A program in a high-level language Source Code

HIDDEN FIGURES Word Search

Type
Word Search
Description

VIRGINIA
HAMPTON
NACA
VIVIAN ADAIR
LESLIE HUNTER
WEST COMPUTING
WOMEN
WORLD WAR II
ROSA PARKS
FORTRAN
PRESIDENT JOHNSON
JIM CROW
PEARLS
THE RESTROOM
COFFEE
AL HARRISON
KARL ZIELINSKI
PAUL STAFFORD
DOROTHY VAUGHN
NASA
ALAN SHEPARD
JOHN GLENN
LANGLEY
MARY JACKSON
KATHERINE JOHNSON
ENGINEERING
MATHEMATICS
TECHNOLOGY
SCIENCE
STEM
BLACK
HIDDEN FIGURES

Artificial Intelligence Word Search

Type
Word Search
Description

Perform
Intelligence
Artificial
Theory
Computer
Logic
StockFish
Program
Humans
Machines
Chess
Game
Factories
Checkers
Future
Allan Turing
DeepMind
John McCarthy
Inferring
Development
Statistics
Alexa
AI
robots
Siri
LCzero
Cosmo
Sophia
Alphazero

Technology Crossword Puzzle

Type
Crossword
Description

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

Technology Crossword

Type
Crossword
Description

The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http

Computing Crossword

Type
Crossword
Description

Which logic gate inverses the input not gate
Who devised the first computer charles babbage
Who is known as the first computer programmer Ada Lovelace
What is a set of ordered instructions carried out by a computer algorithm
Where did they decode enigma messages bletchley park
What was the computer that decoded enigma messages called colossus
What programming language is used to make websites HTML
Who decoded the enigma code alan turing
Which logic gate needs one or the other input to be true or gate
What was the computer used at Bletchley park called The bombe
Where is Bletchley park Milton keynes

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Programming Terms Crossword

Type
Crossword
Description

A set of instructions for the computer that when executed, gives results. Computer Program
A special language that allows people to instruct computers to perform an action or set of actions. Programming Language
People who create, modify, and test code. Computer Programmers
A computer language that only consists of 1's and 0's. Binary
The program itself, as written by the programmer. Source code
The items that your program works with, such as integers and character strings. Data
A sort of box or holder that can be used to store a value. Variable
A programming language construction that allows the programmer to instruct the computer to perform an instruction or set of instructions over and over again. Loop
A methodical process of finding a reducing the number of defects in a computer program. Debug
an error in a software program. Bug