Trying to steal other people's sensitive information
Phishing
Trying to break into computer systems
Hacking
Software programs designed to corrupt computers
Virus
Software protecting computers from danger
Firewall
Being pursued by someone through the anonymity of social media
Cyberstalking
Symbol to look for before entering ANY personal details
Padlock
Being harrassed or threatened online
Cyberbullying
Most commonly used password
Password
Protection for your computer
Antivirus Software
Files sent through email
Attachments

Preview of Crossword

Make this Crossword your own

Add, edit, delete clues, and customize this crossword. Print copies for an entire class. All in 5 minutes.

Icon crossword    Create my Crossword now    

Your customized Crossword will be in your hands in five minutes.

Related Puzzles

Internet Safety

24 terms
Created on May 14, 2015

ITGS Ch. 10

17 terms
Created on Feb 26, 2016

Cyber Security

15 terms
Created on Mar 23, 2016

word search

50 terms
Created on Apr 12, 2016

Cyber Security

20 terms
Created on Apr 25, 2016

internet safety words

10 terms
Created on Apr 28, 2016

technology

20 terms
Created on May 17, 2016

OnGuardians

15 terms
Created on Jun 16, 2016

Technology Crossword Puzzle

15 terms
Created on Aug 4, 2016

Glossary Crossword

10 terms
Created on Sep 2, 2016

Computer Safety

15 terms
Created on Nov 9, 2016

E-Safety

20 terms
Created on Nov 15, 2016

esafety

14 terms
Created on Dec 15, 2016

Computer Safety

25 terms
Created on Jan 9, 2017

midterm review

17 terms
Created on Jan 9, 2017

digital citizenship

15 terms
Created on Jan 19, 2017

ACM Computer Tech Crossword Puzzle

23 terms
Created on Jan 26, 2017

Cyberbullying

21 terms
Created on Jan 30, 2017

Video Terms

32 terms
Created on Feb 2, 2017