Arson and Cybercrime Crossword

Created
Nov 29, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

Indicates at what temp the fire was burning Color of flames
Produced when a substance undergoes rapid oxidation involving heat and light. Fire
The lowest temperature to which a substance must be heated in order for the substance to give off vapors which will burn when exposed to a flame or ignition source. Flashpoint
The location where the fire started. Point of Origin
A fire started deliberately Arson
Substances, such as gasoline, paint thinner, and alcohol, that accelerate the burning process. Accelerants
Noticeable patterns created by the fire as it burns. Burn Patterns
Shows the three elements needed to produce and sustain a fire. Fire Triangle
Determine what type of material was burning Color of smoke
Occur when heavy furniture shields part of a wall Heat Shadows
Gaining access to a system by cracking a password Cracking
A program that appears to be harmless but actually provides backdoor entrance to a target computer Trojan Horse
Computer code with malicious intentions. Malware includes Trojan horses, ransomware, rootkits, scareware, spyware, viruses and worms Malware
Scam software that appears to be legitimate, to encourage download Scareware
A program that replicates rapidly within a computer causing damage to the host computer Virus
A program that spreads rapidly across computers, usually through a network Worm
Spies on activity in a computer, sending information to a third party without the owner’s consent Spyware
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one Website Defacement
Restricts access to a computer; owner must pay ransom to have it removed Ransomware
Using the Internet to circulate incorrect information and cause panic Misinformation spread
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result Hoax Email
Crime related to the transfer of funds over the Internet, by diverting funds, stealing financial information, etc. Electronic funds transfer fraud

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

More Crosswords, Word Searches, and Puzzles

Cyber Security Crossword

Created
Apr 25, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

E-Safety Crossword

Created
Nov 15, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Cyber Security Crossword

Created
Mar 23, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

CYBER AWARENESS CROSSWORD

Created
Nov 22, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

An agreement between two or more entities to allow access to data or information. Details the controls that are to be put in place to protect the data, including how the data will be used, stored, shared and disposed of. DAA
A cipher selected as an official Federal Information Processing Standard (FIPS) for the United States in 1976, and which has subsequently enjoyed widespread use internationally. The algorithm is a sixteen round block cipher which uses a 64bit block and a 56bit key. DES
Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet. DOS
A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster. Such a plan, ordinarily documented in written form, specifies procedures the organisation is to follow in the event of a disaster. DRP
A set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies. (United States of America Federal.) FIPS
A message authentication code that makes use of a cryptographic key along with a hash function. HMAC
The ability of the anti-virus software to detect patterns of behavior on the machine Heuristic Scanning
A system that monitors a network for malicious activities such as security threats or policy IPS
A software update comprised code inserted (or patched) into the code of an executable program. Patch
The security-oriented probing of a computer system or network to seek out vulnerabilities Pen Test
A software program that provides cryptographic privacy and authentication for data communication. PGP
A hacker gains access to a group of computers and then uses them to carry out a variety of attacks on other computers Botnet attack
Cross-site request forgery (or “sea-surf”) attack. Malware from someone who appears to be a trusted user of a site XSRF attack
Distributed denial of service attack. Flooding a network or website or network with requests, making it impossible for legitimate users to access the site DDoS attack
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result Hoax email
Recording the keystrokes made by an authorized user Key logging
Redirecting users from a legitimate site to a bogus one; information entered on the phony site is captured for fraudulent purposes Pharming
Directing users to a bogus site through an email that appears legitimate; information entered on the phony site is captured for fraudulent purposes Phishing
Restricts access to a computer; owner must pay ransom to have it removed Ransomware
Making small, undetectable changes over an extended period of time; “penny shaving” is a type of salami attack Salami attack
Scam software that appears to be legitimate, to encourage download Scareware
Phishing using text messages rather than emails Smishing
Accessing a secure network by changing the remote computer’s IP address to that of a computer with special privileges; often used in DDoS attacks Spoofing
Tricking a user (through an email or phone call) into entering credit card information into a bogus voice response system; information entered into the phony system is captured for fraudulent purposes Vishing
Cross-site scripting attack. Malware injected into a trusted site, presented through a hyperlink XXS attack
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one Website defacement

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Crossword Puzzle

Created
Sep 22, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

A screen that displays an image that is being generated by a computer. monitor
The set of keys that are used to type words on a computer or typewriter. keyboard
A small device that is connected to a computer that you move with your hand to help you click on items on the computer screen. mouse
A machine that is used for printing documents, pictures, etc. printer
An electronic device that can intensify speeches, music, etc., and made audible throughout a room, hall, or the like. speaker
A set of facts or figures that can be displayed through a computer, especially in columns. table
or the Central Processing Unit is the component of a computer system that processes and exchanges data with the peripherals. CPU
The main circuit board of a computer that holds together many of the important components of a computer. motherboard
are on a keyboard to help you enter information on the computer. Keys
where you can find the images on your electronic device. Screen
where you can find the physical components of an electronic device. hardware
a computer program where you can look up and information on the internet. Browser
A group of files or documents that are stored together by a title on your computer. folders
A brief comment or explanation. notes
A small picture on a computer screen that represents a program or function that can be opened. icons
Booting a computer system again usually due to a problem. reboot
A special kind of cord that enables you to connect a computer to another device. USB
An disk that contains usually a video recording or computer data. DVD
To look up something. search

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Arson vocab puzzle Crossword

Created
Mar 21, 2017
Type
Crossword
Description

This crossword contains the following questions and answers:

a temperature measured in degrees Kelvin or degrees rankine by zero is the lowest possible temperature and 273° Kelvin correspond to 0°C and 460° rankine corresponds to Absolute Temperature
an agent often ignitable liquid used to initiate or speed the spread of a fire Accelerant
The room or area where a fire began Are of origin
Iniciación of combustion by heat without a spark or flame Autoignition
Carbonaceous material that has been burned and has a blackened appearance Char
To draw along with or after Extrain
Any chemical compound, mixture or device the primary purpose of which is to function by explosion Explosive
A rapid oxidation process with the evolution of light and heat in varying intensities Fire
The movement of fire from one place to another Fire spread
An opening for the passage of or dissipation of fluids, such as gases,fumes, and the like Vent
The gas phase of a substance particularly of those that are normally liquids or solids ordinary temperatures Vapor
Combustion without flame usually with incandescence and smoke smoldering
Any subsequent explosion resulting from an initial explosion Secondary explosion
A material that yields heat through combustion Fuel
A form of energy characterized by vibration of molecules and capable of initiating and supporting chemical changes and changes of states Heat
The luminous portion of burning gases or valors Flame
Heat transfer to another body or within a medium, such as a gas or liquid Conduction
A small incandescent particle Spark
Initial resulting from self heating Self ingition
A measurement of energy release rate Kilowatt

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Computer Basics ! Crossword

Created
Aug 12, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data Computer
any part of your computer that has a physical structure, such as the keyboard or mouse. Hardware
any set of instructions that tells the hardware what to do and how to do it Softwarwe
the metal and plastic box that contains the main components Computer Case
one of the main ways to communicate with a computer. Keyboard
another important tool for communicating with computers. Commonly known as a pointing device. Mouse
is used to print documents, photos, and anything else that appears on your screen. printer
is the computer's main circuit board motherboard
your system's short-term memory RAM
where your software, documents, and other files are stored hard drive
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language operating system
What id a shorter term for Wireless Internet Connection Wifi
is a type of software that allows you to perform specific tasks app
llows you to write a letter, design a flyer, and create many other types of documents word proccessor
the tool you use to access the Internet web browser
any type of software that is designed to damage your computer or gain unauthorized access to your personal information Malware
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second. speed
When you save a file, the data is written to the hard drive, which acts as long-term storage
is responsible for what you see on the monitor video card
also called an audio card—is responsible for what you hear in the speakers or headphones sound card

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Introduction to Web Design- Crossword 1

Created
Sep 13, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

A list of websites that have been visited recently. Browser History
visual communication combinin images, words, and ideas to convey information to an audience. Graphic Design
allows user to navigate by clicking with a mouse instead of typing User Interface
a programming language used for creating web pages HTML
Specially formatted documents that can contain links, images, and other media. Readable by web browsers HTML Files
A vast computer network linking smaller computer networks worldwide Internet
two or more connected computers that share resources in a certain location Local Area Network
a set of computers which are connected to each other and operate as part of the same system, able to exchange information and messages Network
A small program that can be downloaded which allows users to enhance their browser; this allows extra activities of the web for example, the Quicktime plug-in allows visitors to watch movies and Shocwave plug-in allows users to play games. Plug In
a specialized website that allows you to search through the billions of websites on the World Wide Web to find exactly what you want. Search Engine
A list of websites where the search words are found Search Result
a computer on a network that runs specialized software and stores information in order to "serve" it to the other networked computers Server
a web page's unique address on the World Wide Web that tells the browser exactly where to find the web pages web" which emphasize machine-facilitate understanding of information which will provide a more productive and intuitive user experience. URL
Text or images on a webpage where users can click to travel to another web destination. The mouse pointer turns into a hand when you hover over a link. Web Links
A single document (which can include images, videos, charts, etc.) viewable through a web browser Web Page
a collection of webpages Website
two or more computers or LANS located apart from each other that are connected together for the purposes of sharing information Wide Area Network
the information that is found on the Internet World Wide Web

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Thermochemistry Crossword Puzzle

Created
May 17, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

The study of heat transfer during chemical reactions and changes in state thermochemistry
The reaction or substance changing System
The molar heat of ___ is the amount of heat released when vapor condenses condensation
Energy in chemical bonds (3 words) ChemicalPE
Everything in the universe Surroundings
The law of ___ states energy cannot be created or destroyed (3 words) conservationofenergy
When the system gains heat the reaction is... Endothermic
When the system loses heat the reaction is... Exothermic
Known as "c" in equations (2 words) Specificheat
Amount of heat needed to increase the temperature of an object by 1 degree Celsius (2 words) Heatcapacity
Measurement of the heat flow into or out of the system Calorimetry
Insulated object used in calorimetry experiments Calorimeter
(H) ΔH measures the change in this Enthalpy
A chemical equation that includes the enthalpy change as either a reactant or product Thermochemical
Known as ΔH (3 words) Heatofreaction
Heat of reaction for burning one mole of a substance (3 words) Heatofcombustion
The molar heat of ___ is theheat absorbed by a solid object as it melts fusion
The molar heat of ___ is the heat lost by one mole when a liquid solidifies solidification
The molar heat of ___ is the amount of heat needed to vaporize a liquid vaporization
The change in H caused by dissolution (4 words) Molarheatofsolution
(q) Always flows from warm to cold Heat

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying

Technology Crossword

Created
Aug 12, 2016
Type
Crossword
Description

This crossword contains the following questions and answers:

The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http

    Customize    

Add, edit, delete clues, and customize this puzzle. Print copies for an entire class.

Print without modifying