Type
Word Search
Description

internet
angry
alone
help
computer
ipad
phone
support
sad
mean
cyberbullying

Cyberbullying Crossword

Type
Crossword
Description

An image or user name that represents a person online. Avatar
The denial of access to particular parts of the internet. Blocking
Interactive web journal or diary posted online. Blog
Repeated and deliberate harassment directed at another person. Bullying
Intentional & repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Cyberbullying
Suicide caused directly or indirectly from cyberbullying. Cyberbullicide
Repeated harassment using electronic devices and networked technology that includes threats of harm. Cyberstalking
Evidence of a person's use of the internet. Digital Footprint
Intentionally excluding someone from an online group, like a buddy list or a game. Exclusion
The act of restricting access to certain websites. Filtering
Hardware or software that restricts and regulates incoming and outgoing data to or from computer systems. Firewall
Online fights using electronic messages with angry and vulgar language. Flaming
Repeatedly sending offensive, rude, or insulting messages. Harassment
Breaking into someone's account, posing as that person and sending messages to make the person look bad. Impersonation
An image with text used to describe a thought, idea, or joke that is widely shared. Meme
The one who instigates online social cruelty. Also know as the aggressor. Offender
Sharing someone's secrets or embarrassing information online. Outing
Software or a website that allows one's internet connection to be routed or tunneled through a different connection or site. Proxy
Making a statement or taking an action that indicates harm to another. Threat
A person who is known for creating controversy in an online setting. Troll
The person who is on the receiving end of online social cruelty Victim

Internet Safety Crossword

Type
Crossword
Description

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

Digital Citizenship Crossword

Type
Crossword
Description

communication including television, radio, and newspapers, that often reaches and impacts a large audience media
electronic devices and media platforms such as computers, cell phones, the Internet that allow users to communicate and interact with one another or with the device or application itself digital media
two or three dimensional icon that represents a compute user or a gamer avatar
the act of saying mean things online usually in ALL CAPS Flaming
remix or blend of multiple songs, videos, or other media content into one product Mash up
downloadable video or audio file. podcast
the illegal act of sending emails or messages that appear to come from authentic sources but really come from spammers. phishing
an attempt to trick someone, usually with the intention of stealing money or private information scam
a type of crime in which your private information is stolen and used for criminal activity identity theft
in a position that makes it easier for you to be harmed or attacked vulnerable
someone who sees cyberbullying but does nothing to help bystander
someone who helps when they see cyberbullying occur upstander
to imagine the feelings that someone else is experiencing empathize
bombarding someone with messages over digital media. repeated contact when it is least expected harassing
using fake names, posing as someone else, or creating a fake profile about someone else deceiving
a verbal attack targeting someone because of their race gender, religion or sexual orientation hate speech
a person who is the object of an intentional action target
a person who has malicious intents to hurt or damage someone offender
to increase or make intense escalate

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

Computer Networks Crossword

Type
Crossword
Description

What is it called when computers and other devices that are connected to share hardware, software, and data? Computer Network
A real time, face to face meeting between individuals not in the physically in the same place is called? Videoconference
A phone, such as a cellular or satellite phone, that uses a wireless network. mobile phone
The act of working from a remote location bu using computers and networking technology. telecommute
The use of networking technology to provide medical information and services telemedicine
A network that uses a central device connected directly to several other devices star network
In a client-server network, a computer that is dedicated to processing client requests. server
A location that provides wireless Internet access. hotspot
A network in which computers and other devices are connected to the network via physical cables Wired Network
A network in which computers and other devices are connected without physical cables Wireless Network
A network that uses a central cable to which all network devices connect. Bus Network
In a client server network, a computer or other device that requests and uses network resources. Client
To retrieve files from a server download
to transfer files to a server upload
a private network that is set up similarly to the internet and is accesses via a Web browser Intranet
The amount of data that can be transferred, such as via a bus or over a networking medium, in a given time period. bandwidth
An intranet that is at least partially accessible to authorized outsiders. Extranet
The amount of data that is transferred under real life conditions. Throughput
A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient. Broadcasting
A networking standard for very short-range wireless connections Bluetooth

Cyber Safety Crossword

Type
Crossword
Description

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

technology Word Search

Type
Word Search
Description

social network
software
monitor
cyberbully
modem
keyboard
hardware
mouse
network
firewall
Flash Drive
Personal Computer
email
network
dropbox
blog
technology
har drive
Operating System
digital citizenship

Netiquette Word Search

Type
Word Search
Description

delete
error
update
wifi
wireless
apple
microsoft
thoughtful
cloud
yahoo
google
facebook
socialmedia
webcam
internet
computer
laptop
tablet
cellphone
snapchat
netiquette
lol
photo
email
blogging
instagram
cyberbullying
autocorrect
ttyl
texting

Internet Safety Word Search

Type
Word Search
Description

TEXTING
YOUTUBE
SWEARING
SOCIAL MEDIA
SCHOOL
PROFILE
PRIVACY
PHONE NUMBER
NAME
PASSWORD
INNAPROPIATE SITES
ILLEGAL
GRIEFERS
GAMING
FOLLOWERS
EMAIL
CYBERBULLYING
COMMENTS
CHATROOMS
ADDRESS

Internet Safety Crossword

Type
Crossword
Description

controlled by or connected to another computer or network online
working surface of a desk desktop
legal right given to an originator to print, publish, perform, film, or record the originator's work. copyright
any message passed through digital devices. digital communication
where computer networkers where users can communicate. chat room
regularly updated website or web page, typically one run by an individual or small group blog
capable of copying itself and destroying data. virus
electronic communication used to bully a person or a group of people. cyberbullying
applications that enable users to create and share content or to participate in social networking. social media
set of rules you should follow in order to make the internet better for others, and better for you. digital etiquette
acquisition and use of a person's private identifying information identity theft
A hostile, strongly worded message that may contain obscene language. flame
specific features or software that parents manage the online activities of children parental control
any device used to communicate provocative messages and/or sexual images sexting
A program, or set of instructions, that runs on a computer. software