Type
Crossword
Description

what type of bulling is online? cyber bulling
what should you include in a password? capital letters
what do you do if someone tries to except you on social media? block
you should never tell people your....... passwords
what information should you not give out clue: phone n _ _ _ _ _ _ numbers
when should you have social media? 13
what should you also put in a password? numbers
if someone you dont know asks you to meet up with them, what do you say? no
if your being bullied, who do you tell? parents
what do you do if someone has your password? change it

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

E Safety Crossword

Type
Crossword
Description

You need to keep this secret and make it hard to guess password
You should never accept these from stangers friend request
Someone who hurts you feelings by sending nasty messages cyber bully
This can attack your computer virus
You should never give this out online personal information
You should never arrange to do this with people you don't know Meet up
What you should do to people who send you nasty messages Block
These are people you don't know strangers
If you see something that upsets you who should you tell? parents
You should never send this to people online picture

Cyber Bullying Word Search

Type
Word Search
Description

bullying
cell phones
chat room
digital media
email
Facebook
instant messaging
online communication
online games
posting
privacy setting
reputation
Snapchat
social media
social networking
texting
Twitter

Social Media Crossword

Type
Crossword
Description

A self portrait taken using the reverse camera screen on a smartphone Selfie
Texting is a ______________ __________________ while driving and can lead to death Dangerous distraction
Cyberbullying can be _____________. Know how to stop it before it starts prevented
Using the social media to send or post text or images to hurt or embarrass another person is called ______________. Cyberbullying
This helps give additional safety for kids and teens, allowing them to keep in touch with family and friends Cellphones
Participants in these rooms are not necessarily teens Chat
This has overtaken the frequency of every other form of interaction among teens Texting
Social Media is a wonderful __________ yet you must know how to use it safely. Tool
A cell phones _________ can provide others with your exact physical location GPS
The internet has a great ____________. Watch what you post as you'll have to live with it for a very long time. memory
___________________ __________________ use chat rooms to "meet" someone Sexual predators
Only ____________ someone online who you know in person Friend
Refuse to pass along cyberbullying ____________ Messages
If you encounter someone who is unpleasant or hostile online, ___________ them and report to a trusted adult. Block
Beware of emails trying to _____________ you something Sell
_____________ give your username and password to someone else Never

OPSEC is not Puzzling Crossword

Type
Crossword
Description

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

Customer Service Week Crossword Puzzle

Type
Crossword
Description

Your most important communication tool when you’re on the phone is your _____. voice
Another word for internal customer is _____. coworker
Taking personal responsibility for a customer’s complaint is taking _____ o w n e r s h i p
You sound more relaxed and friendly when you _____ while talking on the phone. s m i l e
You start each call with a friendly ____ g r e e t i n g
Offering a customer additional products or services is cross-selling or _____. u p s e l l i n g
With angry customers it’s important to let them do this, _____. v e n t
A positive one will make your day better. a t t i t u d e
The annual celebration of the importance of customer service is _____. (3 words). CustomerServiceWeek
Customer complaints should be seen as _____ to improve service. opportunit
Delighting your customers means _____ their expectations. exceeding
When speaking with customers you should vary the _____ of your voice. Tone
The people you serve each day. customers
Anticipating problems, heading them off and alerting customers is being _____. proactive
Treat each customer as if they’re the _____ one you’ll deal with that day. only
Customers who have their complaints satisfactorily resolved tell an average of how many people? five
The most important customer service skill is _____. listening

Cyber Security Awareness Crossword

Type
Crossword
Description

Cyber security is a shared __________. Responsibility
This is commonly assigned to bank customers for use with ATMs and for use with debit cards. PIN
A malicious code that can infect your system. Virus
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineering
You should never share your __________. Password
A clean desk policy is important in order to protect __________ information from being revealed. Sensitive
You should _____ a device before stepping away from it. Lock
Any data that could potentially be used to identify a particular person. PII
You should be careful when downloading __________ because it could be malicious. Software
You should _____ your administrator if an incident occurs. Contact
For a password to be secure, it should contain upper and lower case letters, numbers, and __________. Symbols
It is important to have antivirus installed on your computer and on your _______. Smart phone
The "s" in _____ stands for secure and indicated that communications with a webpage is encrypted. HTTPS

Cyber Safety Crossword

Type
Crossword
Description

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

Social Media Crossword

Type
Crossword
Description

A website that is updated regularly by an individual or a group to record opinions or information. Blog
An app where you can send messages to people all over the world for free. Whatsapp
On this app, if you find something funny and want to share it with your friends, you retweet it. Twitter
Platform founded by Mark Zuckererg Facebook
Once you post something online, it is ____ on the internet. Always
A picture you take using the front camera on a phone. Selfie
Blue and white, allows you to video call with friends. Skype
This network allows users to share photos to friends and family. But watch out, they only last for 10 seconds! Snapchat
3.2 billion people use this globally. Without it, social media wouldn't be around today. Internet
Websites and applications that enable users to create and share content or to participate in social networking. Social Media
A form of blogging; were people upload videos to youtube. Vlog
Always choose a hard ____ for your accounts so you don't get hacked! Password
Someone who bullies online is called a ___ bully. Cyber
A computer program that can replicate itself and spread from one computer to another. Virus
Always ask your _____ for permission before going online. Parents

Digital Citizenship crossword

Type
Crossword
Description

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames