Type
Word Search
Description

This word search contains the following answers:

Fraudulant
firewall
verifiable deceptive
authentic
Trustworthy
scam
spear phishing
phishing
boundary
settings
Personal information
digital footprint

    Customize    

Digital Citizenship Terms Word Search

Type
Word Search
Description

This word search contains the following answers:

google
communication
software
hardware
vulnerable
plagiarism
firewall
identity
citation
digital footprint
scheme
scam
persistent
identity theft
social media
website
phishing
deceiving
malware
internet
flaming
anonymous
cyberbullying
bias
defaming
harassing
digital citizenship

    Customize    

Digital Citizenship crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Digital Literacy Word Search

Type
Word Search
Description

This word search contains the following answers:

Alphanumeric
Charts
Columns
CPU
Database
Edit
Email
Firewall
Format
Hardware
Input
Internet
Intranet
Logon
Modem
Monitor
Network
Online
Operating system
Output
Phishing
Presentation
Save
Software
Spreadsheet
Storage device
Tables
USB
Virus
Word processing

    Customize    

Digital Technology Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

    Customize    

Cyberbullying Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

An image or user name that represents a person online. Avatar
The denial of access to particular parts of the internet. Blocking
Interactive web journal or diary posted online. Blog
Repeated and deliberate harassment directed at another person. Bullying
Intentional & repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Cyberbullying
Suicide caused directly or indirectly from cyberbullying. Cyberbullicide
Repeated harassment using electronic devices and networked technology that includes threats of harm. Cyberstalking
Evidence of a person's use of the internet. Digital Footprint
Intentionally excluding someone from an online group, like a buddy list or a game. Exclusion
The act of restricting access to certain websites. Filtering
Hardware or software that restricts and regulates incoming and outgoing data to or from computer systems. Firewall
Online fights using electronic messages with angry and vulgar language. Flaming
Repeatedly sending offensive, rude, or insulting messages. Harassment
Breaking into someone's account, posing as that person and sending messages to make the person look bad. Impersonation
An image with text used to describe a thought, idea, or joke that is widely shared. Meme
The one who instigates online social cruelty. Also know as the aggressor. Offender
Sharing someone's secrets or embarrassing information online. Outing
Software or a website that allows one's internet connection to be routed or tunneled through a different connection or site. Proxy
Making a statement or taking an action that indicates harm to another. Threat
A person who is known for creating controversy in an online setting. Troll
The person who is on the receiving end of online social cruelty Victim

    Customize    

Digital Citizenship Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

communication including television, radio, and newspapers, that often reaches and impacts a large audience media
electronic devices and media platforms such as computers, cell phones, the Internet that allow users to communicate and interact with one another or with the device or application itself digital media
two or three dimensional icon that represents a compute user or a gamer avatar
the act of saying mean things online usually in ALL CAPS Flaming
remix or blend of multiple songs, videos, or other media content into one product Mash up
downloadable video or audio file. podcast
the illegal act of sending emails or messages that appear to come from authentic sources but really come from spammers. phishing
an attempt to trick someone, usually with the intention of stealing money or private information scam
a type of crime in which your private information is stolen and used for criminal activity identity theft
in a position that makes it easier for you to be harmed or attacked vulnerable
someone who sees cyberbullying but does nothing to help bystander
someone who helps when they see cyberbullying occur upstander
to imagine the feelings that someone else is experiencing empathize
bombarding someone with messages over digital media. repeated contact when it is least expected harassing
using fake names, posing as someone else, or creating a fake profile about someone else deceiving
a verbal attack targeting someone because of their race gender, religion or sexual orientation hate speech
a person who is the object of an intentional action target
a person who has malicious intents to hurt or damage someone offender
to increase or make intense escalate

    Customize    

Cyber Security Word Search

Type
Word Search
Description

This word search contains the following answers:

spyware
scam
online
identity
fraud
data
cache
spoofing
Provider
malware
firewalls
cybersquatting
bookmarks
theft
service
phishing
internet
griefing
encryption
Cookies
Antivirus

    Customize    

Identity Theft Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

SSN, Date of Birth, Address, Maiden Name, Phone Numbers and Account Numbers are all examples of... Personal Information
Mail theft, trash sifting, internet, thefts and burglaries, family members and acquaintances, and scams are all ways your ______ can be stolen. Identity
________ _________ and alerts can help to prevent mail theft. Electronic Statements
________ all unnecessary paperwork. DO NOT throw it in the garbage can. Shred
Do not leave wallets and purses in your _____. car
To protect yourself from online theft, use ________ internet sites. secure
If you become a victim of fraud, file a police report with your ______ jurisdiction. local
To protect members from Identity Theft, talk to them about _________ _______ of fraud. warning signs
Protect member's information by ___________ ID. verifying
Be cautious with use of your ____. SSN
A thief can use your identity by using your _______ card and/or ATM card to drain your funds. credit
A thief can use your identity to create ___________ ________ made with your account information on them. counterfeit checks
A thief may ______ benefits under your name. claim
To help protect yourself, ______ your credit report yearly. check
To prevent theft, do not write important ___________ down and keep it in an easily accessible. information
To help keep your information safe, avoid carrying important documents in your purse or wallet, such as your Social Security _______ or multiple credit cards. card
______ ______ is when a person obtains and uses your personal information without your permission for financial gain. Identity theft
America First strives to keep its ________ safe by informing them of possible risks. members
If you obtain a stolen ID from a fraudulent member, do not give the ID ______. back
Always follow __________ procedures. security

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

inappropriate request
avoid risks
social media
prevent
report
online
grooming
trust
email
password
personal information
cyberbully
inappropriate content
respect
internetsafety
netiquette
digital citizen
internet
bystander
phishing

    Customize