Puzzles and worksheets similar to Computer Memory Project Crossword

Cyber Awareness Month Crossword


Something that shows up in a email
Hard to detect both by Users
Identity and Privacy Protection
Someone attempting to create Identity fraud
A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. Generally, a data breach results in internal data being made accessible to external entities without authorization.
A security tool, which may be a hardware or software solution that is used to filter network traffic.
A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
he likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware and spyware/adware.
The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or malicious attachments.
A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite. When the host file or MBR is accessed, it activates the virus enabling it to infect other objects. Most viruses spread through human activity within and between computers
a dishonest scheme; a fraud.
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
A form of malware that monitors user activities and reports them to an external their party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics. However, spyware can also be operated by attackers using the data gathering tool to steal an identity or learn enough about a victim to harm them in other ways.
An attack focusing on people rather than technology
Alerts used as a warning of danger.
an attempt by hackers to damage or destroy a computer network or system.
a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and .
the ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
Malware is defined as any device software that aims to cause damage and steal data. Malware is an abbreviation for malicious software. Ransomware and trojan, for example, are types of malware widely used in email attacks

Digital Design Foundations Vocabulary Crossword


particular size, weight and style of a typeface
exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
a small open-fronted hut or cubicle from which newspapers, refreshments, tickets, etc., are sold.
a large printed picture used for decoration.
moral principles that govern a person's behavior or the conducting of an activity.
an information system where documents and other web resources
videos created with original designs, drawings, illustrations or computer-generated effects that have been made to move in an eye-catching way
means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
assembly area where all the parts of a project are put together
any form of media that uses electronic devices for distribution
a picture, design, or the like, printed from an engraved or otherwise prepared block, plate, etc. an indentation, mark, etc
sound within the acoustic range available to humans.
digital optical disc data storage format
computer program that software developers use to create, debug, maintain, or otherwise support other programs and applications.

Storage and Network Technologies Crossword

Storage and Network Technologies Crossword

RAM stand for
Secondary Memory is also called
The function of CPU is to
Primary and secondary memory can be classified as volatile and non-volatile
Primary memory is classified as
The speed of a CPU is measured in
The most common example of primary memory is
Used to store instructions, data and information for later use
Responsible for the processing of data
A megabyte (MB) refers to approximately of data
A killobytes (KB) equals
Stores information or instruction that can be read and used but cannot be changed
enable a computer to connect to other computers
refers to the process of making copies of data files
Key examples of backup medias
Affordable and it is relativley used for backup purposes
Which type of stiorage end-user can be able to access saved files anyware,anytime using PDA's
Have no moving parts and more expensive than HDD
Magnetic has a very large storage capacity up to
Combine componets of a computer together, so that it can functions
The circuits of a motherboads are called
The CPU is also called
Temporarily storage for data and allow the programs to work faster
A permanent memory us called
The smallest unit in a digit system is
Data on a floppy disk is recorded in rings called
ROM is an example of which of the following
Where does computer stores programs, when the power is OFF
Which of the following is arges unit of storage
What is the latest write-once optical storage media
1 gigabytes is equivalents to
Covers a small geographical area
The capacity of a
CD can store-up to mb of data
Wireless computer network that links two or more devices is called
Piece of hardware that allow a computer to connect to a network
Device that connects a computer/router to a broadband
Type of a terminal that uses electrical signals to transmit data
Web-based network that is only available to an organisation staff
CD ROM stands for
Any storage device added to computer beyond the immediately usable main storage is known as:
The capacity of 3.5 inch floppy disk is
Magnetic disk is an example of
The access method used for cassette tape is
Magnetic tape can serve as :
What is the alternative name for a diskette
A DVD is
DSL stands for

Internal Hardware Crossword

Internal Hardware Crossword

This is the brain of the computer, it processes all instructions.
Supplies power to the motherboard.
Used for read/writing optical discs.
The main circuit board in the computer, where the hardware is connected.
Extracts hot air from the computer case.
Temporary memory, it requires power to retain its data.
Traditional internal storage made up of a stack of magnetised metal disks.
A form of data storage in computers and other electronic devices that can not be easily altered or reprogrammed.
Produces the image you see on a monitor.
Helps connects a computer to a computer network.

Atoms and the Periodic Table Crossword


Non-metal with a mass number of 19 (8)
Metal harder than sodium and in the same group (7)
Gas used to stop Cs and Rb from oxidising in storage (5)
Process that causes reactive metals to discolour in air (9)
Negatively-charged sub-atomic particles (9)
Part of the atom comprising protons and neutrons (7)
Protons have a ______________ charge (8)
Protons and neutrons have a relative ________ of 1 (4)
Na is the chemical symbol for ____________ (6)
The only non-metal Group 3 element (5)
H is the ______________ of hydrogen (8,6)

Poetic Techniques Crossword


what is the poetic technique used to describe 2 or 3 words with the same start sound
which poetic technique is used to give non human objects or animals human characteristics
where you describe something is as or like something else
what is the poetic device that is used for effect and repeats the same word
a poetic device where the sound of the word sound like the sound it makes
when a sentence runs from one sentence to another without pause
3 words or phrases in a line that are continuous
This is when their is a pause in a line created by punctuation
this is when you give a feeling or mood usually set by the setting or weather
a group of words in a passage that have a link or similar meaning
something used a lot in poems and 2 words that sound the same at the end

Distributed System Crossword

Distributed System Crossword

encryption that has two key differences
key to secure messaging
communication between two parties has been overheard by someone
services or data become unavailable, unusable or destroyed
unauthorized changing of data or tampering with a service
additional data or activities are generated
transform data to maintain confidentiality and integrity
verify the claimed identity of a user, client or server
verify the requested action is permitted
useful for analysis of a breach and tracking attackers
requiring correct permission to perform an action
list of those with access (acronym)
a collection of permissions assigned to one type of user
the right to perform one action
one of several security mechanisms working together
TLS spelled out
remote procedure call in short
one easy way to design better security
when security features should be addressed in development lifecycle
how to read encrypted messages
sharing one key
how you get a ticket
common network protection at the edge
allows code from known source to be trusted
most widely used system to get the secrets
how an authority takes away past trust
way to check to see if only one bit is set
temporararily loan your access rights
sent as part of a challenge, prevents replay attacks
feature that allows access without logging in repeatedly
last but perhaps most important system concern
gateway that filters traffic and executable code
key to getting a response
ensuring the message was not modified

Wearable Crossword


Technology worn on your body
The NHS provide this service for people.
a person who has the job of watching or noticing particular things.
the act of stopping something from happening or of stopping someone from doing something.
a system that can show the exact position of a person or thing by using signals from satellites
the use of computers to design objects
Short for computer-assisted manufacturing.
a condition or situation that causes problems, especially one that causes something or someone to be less successful than other things or people:
a device that is used to record that something is present or that there are changes in something.
a set of images and sounds, produced by a computer, that seem to represent a place or a situation that a person can take part in
a device containing a wheel that spins freely within a frame, used on aircraft and ships to help keep them horizontal, and as a children's toy
images produced by a computer and used together with a view of the real world
a device that measures acceleration or G-force
you can wear me round your wrist to monitor your health and I rhyme.

Memory technologies Crossword

Memory technologies Crossword

a form of primary computer data storage that stores data and machine code currently being used.
a type of non-volatile memory used in computers and other electronic devices.
typically used for the task of secondary storage, or long-term persistent storage.
non-volatile firmware used to perform hardware initialization during the booting process, and to provide runtime services for operating systems and programs.
CPU main memory-a hardware or software component that stores data so future requests for that data can be served faster.
computer storage that only maintains its data while the device is powered.
a memory management technique that provides an idealized abstraction of the storage resources that are actually available on a given machine
the long-term memory of a computer. This is where you store documents, music, games and other files while you are not using them.
A type of non volatile memory that stores information in thousands of floating-gate transistors, each with a changeable resistance to electric current.
A portable storage hardware that is safe and reliable and easy to transfer. Plugs into computers connection port

Freya's Properties of Material Crossword


is not scratched easily
is easily scratched
allows light to pass through it
does not allow light to pass through it
allows heat energy to pass through it
does not allow heat energy to pass through it
allows electricity to pass through it
does not allow energy to pass through it
dissolves easily
does not dissolve easily
attracted to a magnet
is not attracted to a magnet
ability to bend
material to have no grip
material that is inflexible
ability for a matrial to not crack or break under impact
takes on and holds water or moisture
is not able to hold or absorb water