Type
Word Search
Description

PRIVATE
ACCOUNT
COMPUTER
PHONE
ONLINE
SNAPCHAT
INSTAGRAM
DOWNLOAD
ADVERTISEMENTS
FILES
TABLET
INTERNET
E SAFTEY

Internet Safety Word Search

Type
Word Search
Description

meet online
family values
uncomfortable
parent permission
responsible
school students
kids rules
younger children
telephone number
posting pictures
technology
online citizen
downloading
tell parents
trust
personal files
public place
passwords
nostrangers
antivirus software
home computer
cyber citizen
Personal Information
Internet Safety

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Computer Networks Crossword

Type
Crossword
Description

What is it called when computers and other devices that are connected to share hardware, software, and data? Computer Network
A real time, face to face meeting between individuals not in the physically in the same place is called? Videoconference
A phone, such as a cellular or satellite phone, that uses a wireless network. mobile phone
The act of working from a remote location bu using computers and networking technology. telecommute
The use of networking technology to provide medical information and services telemedicine
A network that uses a central device connected directly to several other devices star network
In a client-server network, a computer that is dedicated to processing client requests. server
A location that provides wireless Internet access. hotspot
A network in which computers and other devices are connected to the network via physical cables Wired Network
A network in which computers and other devices are connected without physical cables Wireless Network
A network that uses a central cable to which all network devices connect. Bus Network
In a client server network, a computer or other device that requests and uses network resources. Client
To retrieve files from a server download
to transfer files to a server upload
a private network that is set up similarly to the internet and is accesses via a Web browser Intranet
The amount of data that can be transferred, such as via a bus or over a networking medium, in a given time period. bandwidth
An intranet that is at least partially accessible to authorized outsiders. Extranet
The amount of data that is transferred under real life conditions. Throughput
A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient. Broadcasting
A networking standard for very short-range wireless connections Bluetooth

Internet Safety and Cyberbullying Word Search

Type
Word Search
Description

Username
Social Media
Website
Identity Thief
Electronics
Cybersecurity
Chatroom
Think
Download
Kindess
Report
Trusted Adult
Ignore
Delete
Block
Computer
Twitter
Snapchat
Instagram
Facebook
Device
Password
Text Message
Stranger
Personal
Private
Internet Safety
Internet
Online
Cyberbullying

online safety Word Search

Type
Word Search
Description

cyberbullying
data
downloading
facebook
instagram
internet
phishing
snapchat
trolling
twitter

Netiquette Word Search

Type
Word Search
Description

delete
error
update
wifi
wireless
apple
microsoft
thoughtful
cloud
yahoo
google
facebook
socialmedia
webcam
internet
computer
laptop
tablet
cellphone
snapchat
netiquette
lol
photo
email
blogging
instagram
cyberbullying
autocorrect
ttyl
texting

Online Communication Crossword

Type
Crossword
Description

YouTube is an example of this __________ vlog
Talking to one person privately instant messaging
Considered an personal online diary blog
Electronic message sent over the network email
Mobile phones using wireless technology cellphone
Internet transmission of telephone calls voip
Anyone can update, edit this website wiki
Guidelines for posting messaging online netiquette
Multimedia file that can be downloaded podcast
The most popular social media website twitter
Having a conversation with one or more people by telephone teleconference
Distance learning classes online WBT
Linking computer to telephone system CTI
Companies that provide you with Internet service Isps
Talking with several people; informal conversation chatroom
Holding a conversation over the network with a person that I can see videoconferencing
Processing of confirming a valid user authentication
email message travel to recipient SMTP
retrieves email message POP

Computer Literacy Terms Crossword

Type
Crossword
Description

Computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones Application
Receiving data, such as a music or video file, from a server or another computer system. Downloading
A computer device that reads, writes, and stores digital data. Harddrive
A vast global computer network, which links smaller computer networks together. Internet
Any data or information in a computer. Memory
A computer program used to display information, normally in the form of a slide show Presentation
Another term for the CPU of a computer—the central processing unit that runs computer programs. Processor
The process of designing, writing, testing, debugging, and maintaining the source code of computer programs. Progamming
A computer application that simulates a paper accounting worksheet Spreadsheet
Sending data, such as a music or video file, from a local computer system to another computer system or server. Uploading
Electronic mail sent between computer networks. Email

Internet Safety Crossword

Type
Crossword
Description

A form of malicious code that displays unsolicited advertising on your computer. Adware
A saved link to a website that you can click on rather than retyping the web address. Bookmark
A program that les you find, see, and hear material on web pages. Browser
A Friends a user interacts with online through various media such as instant message and chat. Buddies
A location online that allows multiple users to communicate electronically with each other in real time. Chatroom
A piece of information about your visit to a website that some websites record automatically on your computer. Cookie
People who willfully and repeatedly inflict harm through the medium of electronic text such as emails, blogs, or social network posts. Cyberbullies
To copy a file from one computer system to another via the internet. Download
Allows you to block certain types of content from being displayed. Filtering
A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer. Firewall
Participating in internet games which can be played individually or by multiple online users at the same time. Gaming
A tracking feature of Internet browsers that shows all the recent websites visited. History
The site that is the starting point on the web for a particular group or organization. Homepage
Private, real-time text conversation between two users (2 words). Instant Messaging
Stands for malicious sofware or code, that is designed to damage the computer or collect information. Malware
The act of parents tracking the websites or e-mail messages that a child visits or reads. Monitoring
Rules or manners for interacting courteously with others online. Netiquette
Specific features or software that allow parens to manage the online activities of children (2 words). Parental Controls
A secret word or number tha must be used to gain access to an online service. Password
A type of online fraud, where someone tries to trick the victime into revealing sensitive details. Phishing
Online communities where people share infomration about themselves (2 words). Social Media
Any unsolicited e-mail, or junk mail. Spam
A wide variety of software installed on people's computers, which collects information about you withour knolwedge or conesnt and sends it back to whoever wrote the program. Spyware
Browsing around various websites following a particular personal interest. Surfing
To send information from your computer to another computer. Upload
The name a suer selects to be identified on a computer, network, or in an online gaming forum. Username
A software program that typically arrives through email attachments and quickly exhausts the computer's memory. Virus

Your Digital Footprint Word Search

Type
Word Search
Description

control
data
email
facebook
facetime
gaming
google
hurtful
identity
instagram
internet
permanent
pictures
private
profile
public
reputation
respect
safety
search
security
skype
snapchat
technology
trace
trusted
twitter