Type
Crossword
Description

This crossword contains the following questions and answers:

what does the 'C' in CEOP stand for? Child
What thing is on the 'report abuse/Click CEOP button? eye
What do you leave after you do anything online? (2 words) Internet Footprint
You should always ask for someones ........ before posting a picture of them online. permission
What is the most used search engine? google
If you have a social media account make sure you set it to .............. private
what shouldn't you post online? (2 words) email adress
A social media app. facebook
What is the name of a thing attacking your device? virus
all of my ....... emails go to the junk mail. spam
A ....... hides behind a screen sending nasty messages. troll
what are the small files on a computer that hold a modest amount of data specific to a certain client or website? cookie
what is the name of one of the inventors that created the internet? Robert.E ........ Kahn
A recorded moment. video
The thing that you use while face timing on a computer. webcam
a persons summary or their personal details on a current situation (social media). Their ....... profile
A certain bird on social media. Twitter
You should always save ......... of the texts, calls or pictures that someone used to cyberbully you. Evidence.
The use of leverage, force or manipulation to make you do something. blackmail
To save something on your device. Download
You .......... someone when you receive threats or unwanted messages. block
The name of the thing that connects us to the internet wifi
A unit of information equal to one thousand million bytes. gigabyte
To make a clip stop playing you press ......... button. pause
True or False? you should tell everyone you know your password False
Is your date of birth classed as personal information? (yes or no). yes
software which is specifically designed to disrupt, damage, or gain authorized access to a computer system. Malware

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

OPSEC is not Puzzling Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Technology Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

    Customize    

Digital Citizenship crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames

    Customize    

Computer Basics ! Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data Computer
any part of your computer that has a physical structure, such as the keyboard or mouse. Hardware
any set of instructions that tells the hardware what to do and how to do it Softwarwe
the metal and plastic box that contains the main components Computer Case
one of the main ways to communicate with a computer. Keyboard
another important tool for communicating with computers. Commonly known as a pointing device. Mouse
is used to print documents, photos, and anything else that appears on your screen. printer
is the computer's main circuit board motherboard
your system's short-term memory RAM
where your software, documents, and other files are stored hard drive
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language operating system
What id a shorter term for Wireless Internet Connection Wifi
is a type of software that allows you to perform specific tasks app
llows you to write a letter, design a flyer, and create many other types of documents word proccessor
the tool you use to access the Internet web browser
any type of software that is designed to damage your computer or gain unauthorized access to your personal information Malware
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second. speed
When you save a file, the data is written to the hard drive, which acts as long-term storage
is responsible for what you see on the monitor video card
also called an audio card—is responsible for what you hear in the speakers or headphones sound card

    Customize    

Cyber Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

    Customize    

Computer Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A screen that displays an image that is being generated by a computer. monitor
The set of keys that are used to type words on a computer or typewriter. keyboard
A small device that is connected to a computer that you move with your hand to help you click on items on the computer screen. mouse
A machine that is used for printing documents, pictures, etc. printer
An electronic device that can intensify speeches, music, etc., and made audible throughout a room, hall, or the like. speaker
A set of facts or figures that can be displayed through a computer, especially in columns. table
or the Central Processing Unit is the component of a computer system that processes and exchanges data with the peripherals. CPU
The main circuit board of a computer that holds together many of the important components of a computer. motherboard
are on a keyboard to help you enter information on the computer. Keys
where you can find the images on your electronic device. Screen
where you can find the physical components of an electronic device. hardware
a computer program where you can look up and information on the internet. Browser
A group of files or documents that are stored together by a title on your computer. folders
A brief comment or explanation. notes
A small picture on a computer screen that represents a program or function that can be opened. icons
Booting a computer system again usually due to a problem. reboot
A special kind of cord that enables you to connect a computer to another device. USB
An disk that contains usually a video recording or computer data. DVD
To look up something. search

    Customize    

Digital Citizenship Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

communication including television, radio, and newspapers, that often reaches and impacts a large audience media
electronic devices and media platforms such as computers, cell phones, the Internet that allow users to communicate and interact with one another or with the device or application itself digital media
two or three dimensional icon that represents a compute user or a gamer avatar
the act of saying mean things online usually in ALL CAPS Flaming
remix or blend of multiple songs, videos, or other media content into one product Mash up
downloadable video or audio file. podcast
the illegal act of sending emails or messages that appear to come from authentic sources but really come from spammers. phishing
an attempt to trick someone, usually with the intention of stealing money or private information scam
a type of crime in which your private information is stolen and used for criminal activity identity theft
in a position that makes it easier for you to be harmed or attacked vulnerable
someone who sees cyberbullying but does nothing to help bystander
someone who helps when they see cyberbullying occur upstander
to imagine the feelings that someone else is experiencing empathize
bombarding someone with messages over digital media. repeated contact when it is least expected harassing
using fake names, posing as someone else, or creating a fake profile about someone else deceiving
a verbal attack targeting someone because of their race gender, religion or sexual orientation hate speech
a person who is the object of an intentional action target
a person who has malicious intents to hurt or damage someone offender
to increase or make intense escalate

    Customize    

Cyberbullying Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

An image or user name that represents a person online. Avatar
The denial of access to particular parts of the internet. Blocking
Interactive web journal or diary posted online. Blog
Repeated and deliberate harassment directed at another person. Bullying
Intentional & repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Cyberbullying
Suicide caused directly or indirectly from cyberbullying. Cyberbullicide
Repeated harassment using electronic devices and networked technology that includes threats of harm. Cyberstalking
Evidence of a person's use of the internet. Digital Footprint
Intentionally excluding someone from an online group, like a buddy list or a game. Exclusion
The act of restricting access to certain websites. Filtering
Hardware or software that restricts and regulates incoming and outgoing data to or from computer systems. Firewall
Online fights using electronic messages with angry and vulgar language. Flaming
Repeatedly sending offensive, rude, or insulting messages. Harassment
Breaking into someone's account, posing as that person and sending messages to make the person look bad. Impersonation
An image with text used to describe a thought, idea, or joke that is widely shared. Meme
The one who instigates online social cruelty. Also know as the aggressor. Offender
Sharing someone's secrets or embarrassing information online. Outing
Software or a website that allows one's internet connection to be routed or tunneled through a different connection or site. Proxy
Making a statement or taking an action that indicates harm to another. Threat
A person who is known for creating controversy in an online setting. Troll
The person who is on the receiving end of online social cruelty Victim

    Customize