Type
Crossword
Description

Portions of database may reside in different _____ locations. Physical
The _______ must communicate and enforce appropriate standards to be used in documentation or design. Designer
One of the four phases of conceptual design. Data model _____. Verification
Involves modelling independent of the DBMS. _______ design. conceptual
First step when doing data analysis and requirements. Discover data _______ characteristics. element
The information system provides for data collection, _____, and retrieval storage
Process of creating information system, systems ________. Development
Second phase of The SDLC. Analysis
Phase of SDLC where coding, testing and debugging is performed. Implementation
Phase of DBLC where the required information flow is produced. Operation
Database system specifications is made of three parts which are objectives, boundaries and ______. scope
Characteristics required to build database model. Database ______. Design
Translate the conceptual model into definitions for tables, views and so on. ______ design. logical
Critical to information system’s smooth operation. DBMS _____ selection software
Occurs in parallel with applications programming. Testing and _______. evaluation
Preventive maintenance Backup
Classical approach to database design, Identifies data sets and defines data elements for each of those sets. topdown

MS Access Crossword Puzzle

Type
Crossword
Description

column in a table that contains a specific piece of information within a record. Field
collection of organized data that allow access, retrieval, and use of that data Database
Small box or bar that selects the entire row when clicked Row Selector
A collection of rows and columns Data Sheet
Row in a table that contains specific information about a person, product, or event Record
A object Is Not A Type Of Microsoft Access Database Object Worksheets
The Key Uniquely Identifies Each Record PrimaryKey
Enables You To View Data From A Table Based On A Specific Criterion Query
In the context of databases, a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table. Relationship
It is a database management system (DBMS) based on the relational model. RDBMS
An object which stores data in rows and columns. Table
The basic elements of a form or a report are called: Controls
Type of control box which is most often associated with a bound control. TextBox

Computer Terms Crossword

Type
Crossword
Description

is the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills Digital Literacy
a computer designed for use by one person at a time. Personal Computer
is the collection of physical parts of a computer system. Hardware
is a generic term for organized collections of computer data and instructions Software
one of the most essential parts of a computer system. Motherboard
A central processing unit CPU
refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. Back Up
The primary computer storage device, which spins, reads and writes one or more fixed disk platters. Hard Drive
Short for digital versatile disc or digital video disc DVD
a device or program that enables a computer to transmit data over Modem
a widely used sans-serif typeface developed in 1957 by Swiss typeface designer Max Miedinger Helvetica
Universal Serial Bus USB
The global communication network that allows almost all computers worldwide to connect and exchange information. Internet
providing a common topic identifier in text and chat messages so they can be searched as a group. Commonly used in tweets hashtag
connects to the motherboard of a computer system and generates output images to display. Video Card

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Database Essentials Vocabulary Crossword

Type
Crossword
Description

A gallery that you can use to insert predefined, templates consisting of objects like tables, forms, and reports into a preexisting databse Application Parts
Two or more primary keys used in a table Composite Key
The kind of information a field contains Data Type
A tool for collecting and organizing information Database
A system for managing data that allows the user to store, retrieve, and analyze information DBMS
A visual representation of the data contained in a table or of the results returned by a query Datasheet
Columns in a database table Field
A primary key from one table that is used in another table Foreign Key
A database object that simplifies the process of entering, editing, and displaying data Form
The standards and guidelines of database design that can be used to determine if a database is structured corrrectly Normal Forms
The process of applying rules to a database design to ensure that information is divided into the appropriate tables. Normalization
Database elements, such as tables, queries, forms, and reports Objects
The column in a database that uniquely identifies each row Primary Key
A database object that enables stored data to be searched and retrieved Query
Row in a database table Record
Duplicate Information Redundant Data
Rule that prevents orphaned records Referential Integrity
A group of database tables that is connected or linked by a defined relationship that ties the information together Relational Database
A database object that presents information in a format that is easy to read and print Report
The most basic database object; stores data in categories Table

System Software Crossword

Type
Crossword
Description

Output that is used to make changes to input or processing. Feedback
Data that is shaped into a meaningful manner and is used in decision-making. Information
Raw facts that occur in the physical environment or organisation Data
System software that helps the user in the creation, controlling development, usage and maintenance of the databases of computer systems. DBMS
Software consists of the programs for data/ information processing Software
A network that crosses metropolitan, regional or national boundaries WAN
A set of programs controlling the computer hardware and acting as an interface with the application programs. Operating System
Telecommunication device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing Router
A standard set of rules and procedures for the control of communications in a network. Protocol
Involves translating what a user wants to accomplish into a code that the computer can understand and execute. Programming
Converting/ transforming of data into useful outputs Processing
Hardware components that enable a computer system to communicate information to humans or other machines so that it can be used. Output Devices
Transactions that are accumulated and processed later as a group or in a batch. Batch Processing
Telecommunication device that connects one local area network to another one that uses the same telecommunications protocol. Bridge
A hidden program that inserts itself into a computer’s systems Computer Virus
Can be compared with the human brain. It obtains instructions from memory, interprets them and notifies the other components to perform them CPU
The ability to confer with a group of people simultaneously using telephone or e-mail group communication software Teleconferencing
A formal collection of people and other resources assembled together in order to establish a set of goals. Organisation
Telecommunication device that serves as an entrance to another network Gateway
Data is processed immediately after being captured OLTP

Human Resource Management Crossword

Type
Crossword
Description

Job _______ is a process to identify and determine in detail the particular job duties and requirements and the relative importance of these duties for a given job. Analysis
Job _________ is a statement of the essential compotents of a job class including a summary of the work to be performed, primary duties and responsibilities, and the minimum qualifications and requirements necessary to perform the essential functions of the job. Specification
A job _________ will tell you what your employer will expect from you, as well as what you can expect from your employer. Description
Job Analysis should collect information on the following areas: Duties and Tasks, Tools and Equipment, Relationships, Requirements, and ________________. Environment
In terms of Job Analysis, 'relationships' refer to ____________ given and received and relationships with internal and external people. supervision
The purpose of Job Analysis is to establish and document the 'job relatedness' of employment procedures such as training, selection, ______________, and performance appraisal. compensation
The main purpose of a job description is to collect job-related ______ in order to advertise for a particular job. data
Job Specification helps recruiting teams understand what level of _____________, qualities and set of characteristics should be present for a candidate to be eligible for the job opening. qualitifications
Job Description and Job Specification are two integral parts of ______________. Job Analysis
_______________________ specialists are responsible for recruiting, screening, interviewing and placing workers. Human Resources
Job Descriptions are based on objective information obtained through job analysis, an understanding of the _______________ and skills required, and the needs of the organization to produce work. competencies
Job Descriptions help an employer cover _____________ bases. legal

INFO Security Crossword

Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

Technology Crossword

Type
Crossword
Description

The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http

Nature Of Science Crossword

Type
Crossword
Description

In science, (blank) can also involve the recording of data via the use of instruments Observation
An (blank) is a logical interpretation based on what scientists observe. Inference
consisting in systematic observation, measurement, and experiment, and the formulation, testing, and modification of hypotheses. Scientific Method
variables that the experimenter changes independent variable
variable being tested in a scientific experiment Dependent Variable
is an experiment or observation designed to minimize the effects of variables other than the independent variable. control
an idea or explanation that you then test through study and experimentation. hypothesis
final process of the basic scientific method Conclusion
"a method of investigation involving observation and theory to test scientific hypotheses." analysis
which serves to either support or counter a scientific theory or hypothesis. Evidence
researcher subjectively gathers information that focuses more on the differences in quality than the differences in quantity, qualitative
of, relating to, or expressible in terms of quantity Quantitative

chapter 1: The Nature of Science Crossword

Type
Crossword
Description

facts and statistics collected together for reference or analysis data
a sample that is treated like other experimental groups except that is the independent variable is not applied to it. control
Prediction or statement that can be tested and may be formed by prior knowledge, any previous observations, and new information. hypothesis
facts, information, or ideas for use in creating a book or other work. materials
a judgment or decision reached by reasoning. conclusion
Used to answer scientific questions by testing a hypothesis through the use of a series of carefully controlled steps. experimental research
purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. design
a room or building equipped for scientific experiments, research, or teaching, or for the manufacture of drugs or chemicals. laboratories
Factor that is being measured during an experiment. dependent variable
an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. computer
Process used to investigate what is happening around us in order to solve problems or answer questions; part of everyday life. science
Answers scientific questions through observation. descriptive research
discover or reveal (something) through detailed examination analyze
Ways to solve problems that can include step-by-step plans, making models, and carefully through-out experiments. scientific method
Variable that stays the same during an experiment. constants
the size, length, or amount of something, as established by measuring. measurements
a device or implement, especially one held in the hand, used to carry out a particular function. tools
a test of the performance, qualities, or suitability of someone or something. trials
A variable that can be changed during a experiment. independent variable
A set of controlled steps carried out to discover, test, or demonstrate. experiment