Word Scramble

email address
world wide web
carbon copy

Computer Terms Word Search

Word Search

Clip art
flash drive
log out

Internet Terms Crossword


A network of computers spanning the globe. The internet
A software program that enables you to view Web pages on your computer. internet browser
A site or area on the World Wide Web that is accessed by its own Internet address. website
The original starting page. home page
Tells you the name of the web page. title bar
Has commands for moving around the web page, printing, etc. menu bar
Shortcuts to commands. tool bar
Webpage address. If you want to go directly to a webpage, you will need to know the address. address bar
Using a search engine like Google to find the address. keyword search
A web site that helps you find the web address of another website. search engine

Internet Safety Crossword


A form of malicious code that displays unsolicited advertising on your computer. Adware
A saved link to a website that you can click on rather than retyping the web address. Bookmark
A program that les you find, see, and hear material on web pages. Browser
A Friends a user interacts with online through various media such as instant message and chat. Buddies
A location online that allows multiple users to communicate electronically with each other in real time. Chatroom
A piece of information about your visit to a website that some websites record automatically on your computer. Cookie
People who willfully and repeatedly inflict harm through the medium of electronic text such as emails, blogs, or social network posts. Cyberbullies
To copy a file from one computer system to another via the internet. Download
Allows you to block certain types of content from being displayed. Filtering
A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer. Firewall
Participating in internet games which can be played individually or by multiple online users at the same time. Gaming
A tracking feature of Internet browsers that shows all the recent websites visited. History
The site that is the starting point on the web for a particular group or organization. Homepage
Private, real-time text conversation between two users (2 words). Instant Messaging
Stands for malicious sofware or code, that is designed to damage the computer or collect information. Malware
The act of parents tracking the websites or e-mail messages that a child visits or reads. Monitoring
Rules or manners for interacting courteously with others online. Netiquette
Specific features or software that allow parens to manage the online activities of children (2 words). Parental Controls
A secret word or number tha must be used to gain access to an online service. Password
A type of online fraud, where someone tries to trick the victime into revealing sensitive details. Phishing
Online communities where people share infomration about themselves (2 words). Social Media
Any unsolicited e-mail, or junk mail. Spam
A wide variety of software installed on people's computers, which collects information about you withour knolwedge or conesnt and sends it back to whoever wrote the program. Spyware
Browsing around various websites following a particular personal interest. Surfing
To send information from your computer to another computer. Upload
The name a suer selects to be identified on a computer, network, or in an online gaming forum. Username
A software program that typically arrives through email attachments and quickly exhausts the computer's memory. Virus

Cyber Security Crossword


any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

technology Crossword


company of the type of touch screen phone most of the world uses today apple
does not eliminate servers serverless computing
a video adapter video card
is the integration of digital information with live video augmented reality
a conventional method of transmitting data Analogue
is software that allows you to view a PDF document Adobe Acrobat Reader
is a document sent with an email message Attachment
refers to the part of an application that performs an essential task not apparent to the user Back-end
smallest unit of measurement in computing. bit
a wireless communications technology intended to replace cables bluetooth
a saved link to a particular Web page bookmark
to load and initialise the operating system on a computer. boot
A software program that allows you to surf the web Browser
is temporarily stored on your computer. Cache
microprocessor that performs many functions and calculations that make your computer run Chip
refers to a website's text and information, as opposed to its design and structure Content
refers to measures designed to protect your computer Cybersecurity
a small program that allows a peripheral device such as a printer or scanner to connect to your PC Device driver
method by which users access and save or "pull down" software or other files to their own computers Download
electronic mail is a way of sending messages over the internet Email

Technology Crossword


The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http

Key Skills Crossword


Part of your email software where you store details of your ‘friends and contacts’ email addresses (7,4) Address Book
Software helps protect yourcomputer from viruses (9) Anti-virus
Another word for computer programme (11) Application
The place on a website where you find old articles, stories etc (7) Archive
A file which is sent with an email (10) Attachment
A technical term for copying files onto disk or CD-ROM for safe keeping (6) Backup
Means Blind carbon or courtesy copy. This box allows you to send an email to more than one person but their email addresses are hidden fromother recipients (1,1,1) Bcc
A permanent high-speed internet connection (9) Broadband
Errors in a piece of software or web page that can make it break or work (3) Bugs
Means Carbon or Courtesy Copy or Typing an email address or string of email addresses in the this box will send your mail to those additional addresses as well as the main recipient (1,1) cc
When your computer temporarily stops working. It may pause or freeze up, or tell you to restart or quit (5) Crash
The flashing vertical line on the screen that shows you where you are and where the next character you type will appear (6) Cursor
Selecting text, images or files and deleting them from one place while putting them in another (3,3,5) Cut and paste
amera that takes photographs and stores them on disks or smart cards rather than on film (7,6) Digital Camera
Software which runs hardware attached to your computer like a modem, printer or scanner. New hardware normally comes with a CD containing the necessary drivers to install on your computer. Driver
Getting a file onto your computer from another computer on the internet. Download
Clicking on an icon or selection, holding the mouse button down and moving the mouse to ‘drag’ the selection to a new location. When the mouse button is released the item is ‘dropped’. Draganddrop
Electronic mail. Messages (sometimes with attachments) sent over the internet from one email address to another. Email
A ‘complaint’ by the computer that something has gone wrong, maybe including an code’. Errormessage
Frequently Asked Questions. A list of standard answers to questions which newcomers to a topic or website may have. FAQ
Data stored on a disk. There are two types: ‘program files’ (with instructions that make up software applications, e.g. Word) and ‘data files’ (files created by you and me, e.g. a letter or photo). File
A program which sits between your computer and the internet and watches for hacking, viruses or unapproved data transfer. Firewall
A plug-in application you download which allows your browser to show animations. Flash
Unauthorised access to a computer, its files and programs by a ‘hacker’, a computer expert who can break through its security. Hacking
The place inside your computer where you save documents, pictures, applications, etc. Hard drive/Hard disk
The ‘front page’ of a website, where you’re told what’s on the site, how to get around it and how to search for things that’ll interest you. Homepage
A series of letters, numbers and characters that you enter to get into your computer, internet connection, email or websites that you are registered with. Password
The button that you use to download a web page again. In Internet Explorer it’s called “Refresh” and in Mozilla Firefox “Reload”. You should press this button if for some reason a web page appears not to have loaded correctly. Refresh/Reload
Some websites ask you to give your name, email address and other personal information in order to view pages. This is called registering. Register
A website which allows you to search the internet for information. It lists results that relate to your key words. Searchengine
Any programs such as word processors, email applications or internet browsers. Software
Junk email sent to many people at once, usually involving advertising or offering services. SPAM is very deeply frowned upon by most internet users, and where it involves advertising or a false return address it is particularly disliked. SPAM
Stands for Uniform Resource Locator, the technical term for the address of a website or document on the web (e.g. www.bbc.co.uk). URL
A series of letters and numbers you type into your computer, email account or other computer network service to tell it who you are. Username
Pieces of code that are designed to reproduce and damage data or system performance. There are thousands of viruses and the numbers keep growing. Virus
Software which allows you to surf the internet. Webbrowser
Text which is arranged in a non-linear fashion and which you continue reading by clicking on links. Hypertext
A small picture which, when you click on it launches an application, program or acts like a link on the World Wide Web. Icon
The folder in your email program / webmail where you get your incoming emails. Inbox
Millions of computers around the world connected together by telephone lines, cables or satellites. Internet
One of the most popular web browsers, designed by Microsoft. InternetExplorer
Internet Service Provider. An ISP is the company that provides internet connections. ISP
Direct marketing sent by email rather than by the post. Junk Junkemail
A small, portable computer which can be battery operated as well as run from the mains. Laptop
Words or pictures you can click on which take you from somewhere (an internet page, an email message etc.) to somewhere else (another page, a picture etc.). Link
Using a username and password to prove your identity so that you can enter your computer or internet account. Loggingin
A family of computers developed by Apple. Macintosh
The folder which contains a person’s individual items such as an inbox, outbox, sent items, notes and calendar. Mailbox
The storage and thinking parts of your computer. More storage ? on your hard disk (ROM) means you can save more files and more thinking ? (RAM) means your computer can perform more complex tasks quicker. Memory
The display screen on your computer. Monitor
Describes when your computer is not connected to the internet. Offline

Internet Crossword


Free software package or mobile app that lets you view web pages, graphics, and most online content. Browser
It is the web browser address of internet pages and files. URL
Sending and receiving of typewritten messages from one screen to another E-Mail
Broad term that describes transferring something you find on the internet or World Wide Web to your computer or other device Download
Consists of software or hardware that protects your computer from hackers and viruses. Firewall
Modern online writer's column. Blog
A computer that is used to transfer data on the Internet Host
Large database of domain names and their correspondent IP addresses DNS
Unique number used to identify a computer on the Internet IP address
Main or index page of a web site. Home Page

Computer Crime Crossword


What stops people from illegally distributing and copying material? Copyright
what software is designed to disrupt, damage, or gain authorised access to a computer system? Malware
what program is designed to breach the security of a computer system? TrojanHorse
what can be downloaded accidentally onto a computer whilst you have e.g. illegally downloaded a film? Virus
When a hacker steals personal information e.g. bank passwords and uses it to steal money from you Fraud
when someone sends emails posing as a company asking for personal information Phishing
messages from crooks trying to steal your money or your identity EMAILSCAM
a piece of software that processes incoming emails so as to prevent spam from reaching a user's inbox. SPAMFILTER
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Cyberbullying
when someone or a robot gets into your device and steals personal information like pictures and bank details Hacking
obvious, unauthorized, malicious modification or destruction of data such as information on Web sites. Vandalism

Technology Crossword Puzzle


A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load