Type
Crossword
Description

term for unwanted email Spam
Using the paper clip icon creates an Attachment
Who the email is going to: Recipient
What the "e" in email stands for: Electronic
Where new mail can be found Inbox
What "cc" stands for courtesy copy
To permanently remove an email Delete
What you do when you respond to an email Reply
email accounts name Username
Attempt to gain personal information through an email attachment Phishing
History of an email from start to last reply Thread
Along with your username you must enter this to access your email account Password
To mark a message for follow up Flag
To create a new message Compose
The initials used when you don't want everyone to know who is receiving the same email BCC

E-mail Terms Crossword

Type
Crossword
Description

a method of exchanging short digital messages electronicmail
first portion of an email address that the user creates; can not contain any special characters (numbers and letters only) username
.org .edu .net .gov extension
@gmail @wcpss @yahoo domainname
displays messages that the user has recieved inbox
displays messages that the user has started but will finish and send out later draft
displays messages that are ready or scheduled to be sent out outbox
indicating that someone else will receive the email but isn't the direct recipient of the message (the recipient can see everyone attached to the email) carboncopy
feature used by the sender when he does not want the recipient to know that someone else will receive the email. blindcopy
files that are attached to the email (can be pictures, letters, song, etc.) attachments
feature that automatically stores email addresses' of colleagues, family, and friends addressbook
unwanted emails sent out that can be hazardous to your computer spam

Email Basics Crossword

Type
Crossword
Description

List of names and e-mail addresses, created and stored by a user. Also called contacts folder. Address Book
Allows you to email two or more people without anyone being able to see the person who was the included in the sent email. It protects the identity/email address of all parties to the email. Blind Carbon Copy
Sends a message to additional recipients. All parties can see who is receiving the message. Carbon Copy
Send an exact copy of the e-mail to another person. The original sender of the message may not be aware that the message is being sent to another party Forward
Send an e-mail in response to an e-mail you have received. Reply
Send an e-mail to a group of people in response to an e-mail you have received. Reply to All
A heading at the top of an e-mail that identifies what the e-mail is about. Subject
A file added to an e-mail and sent along with it. Attachment
A group of email addresses saved to make it easier to send a message to everyone in the group via the group name. Mailing List
Abbreviation for Blind Carbon Copy BCC
Abbreviation for Carbon Copy CC
An email that has been started but not sent. Draft
A folder that houses deleted emails and cleans itself out every 30 days. Trash
A type of email pretending to be from a bank or trusted source in order to steal your personal information. Might be an offer saying free tickets, or collect your winnings. Phishing
Another word for Spam Mail Junk

How gmail works !! Crossword

Type
Crossword
Description

Who your sending your email to Recipient
The name you use to sign into gmail Username
What new emails appear as Bold
Write or create Compose
Short description of the message Subject
Emails you started but didn’t finish or delete Drafts
Where all your emails appear Inbox
Carbon copy, sent to more than one recipient Cc
Where all your erased emails appear Trash
Blind carbon copy, you send an email to only one person Bcc

EMAIL Word Search

Type
Word Search
Description

caution
all caps
subject
attachments
groups
contacts
signature
compose
send
address
etiquette
flaming
junk mail
spam
scam
link
phishing
worm
virus
blind carbon copy
reply
reply all
forward
carbon copy

Computer Terms Word Search

Type
Word Search
Description

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

Computer Crime Crossword

Type
Crossword
Description

What stops people from illegally distributing and copying material? Copyright
what software is designed to disrupt, damage, or gain authorised access to a computer system? Malware
what program is designed to breach the security of a computer system? TrojanHorse
what can be downloaded accidentally onto a computer whilst you have e.g. illegally downloaded a film? Virus
When a hacker steals personal information e.g. bank passwords and uses it to steal money from you Fraud
when someone sends emails posing as a company asking for personal information Phishing
messages from crooks trying to steal your money or your identity EMAILSCAM
a piece of software that processes incoming emails so as to prevent spam from reaching a user's inbox. SPAMFILTER
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Cyberbullying
when someone or a robot gets into your device and steals personal information like pictures and bank details Hacking
obvious, unauthorized, malicious modification or destruction of data such as information on Web sites. Vandalism

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

Key Skills Crossword

Type
Crossword
Description

Part of your email software where you store details of your ‘friends and contacts’ email addresses (7,4) Address Book
Software helps protect yourcomputer from viruses (9) Anti-virus
Another word for computer programme (11) Application
The place on a website where you find old articles, stories etc (7) Archive
A file which is sent with an email (10) Attachment
A technical term for copying files onto disk or CD-ROM for safe keeping (6) Backup
Means Blind carbon or courtesy copy. This box allows you to send an email to more than one person but their email addresses are hidden fromother recipients (1,1,1) Bcc
A permanent high-speed internet connection (9) Broadband
Errors in a piece of software or web page that can make it break or work (3) Bugs
Means Carbon or Courtesy Copy or Typing an email address or string of email addresses in the this box will send your mail to those additional addresses as well as the main recipient (1,1) cc
When your computer temporarily stops working. It may pause or freeze up, or tell you to restart or quit (5) Crash
The flashing vertical line on the screen that shows you where you are and where the next character you type will appear (6) Cursor
Selecting text, images or files and deleting them from one place while putting them in another (3,3,5) Cut and paste
amera that takes photographs and stores them on disks or smart cards rather than on film (7,6) Digital Camera
Software which runs hardware attached to your computer like a modem, printer or scanner. New hardware normally comes with a CD containing the necessary drivers to install on your computer. Driver
Getting a file onto your computer from another computer on the internet. Download
Clicking on an icon or selection, holding the mouse button down and moving the mouse to ‘drag’ the selection to a new location. When the mouse button is released the item is ‘dropped’. Draganddrop
Electronic mail. Messages (sometimes with attachments) sent over the internet from one email address to another. Email
A ‘complaint’ by the computer that something has gone wrong, maybe including an code’. Errormessage
Frequently Asked Questions. A list of standard answers to questions which newcomers to a topic or website may have. FAQ
Data stored on a disk. There are two types: ‘program files’ (with instructions that make up software applications, e.g. Word) and ‘data files’ (files created by you and me, e.g. a letter or photo). File
A program which sits between your computer and the internet and watches for hacking, viruses or unapproved data transfer. Firewall
A plug-in application you download which allows your browser to show animations. Flash
Unauthorised access to a computer, its files and programs by a ‘hacker’, a computer expert who can break through its security. Hacking
The place inside your computer where you save documents, pictures, applications, etc. Hard drive/Hard disk
The ‘front page’ of a website, where you’re told what’s on the site, how to get around it and how to search for things that’ll interest you. Homepage
A series of letters, numbers and characters that you enter to get into your computer, internet connection, email or websites that you are registered with. Password
The button that you use to download a web page again. In Internet Explorer it’s called “Refresh” and in Mozilla Firefox “Reload”. You should press this button if for some reason a web page appears not to have loaded correctly. Refresh/Reload
Some websites ask you to give your name, email address and other personal information in order to view pages. This is called registering. Register
A website which allows you to search the internet for information. It lists results that relate to your key words. Searchengine
Any programs such as word processors, email applications or internet browsers. Software
Junk email sent to many people at once, usually involving advertising or offering services. SPAM is very deeply frowned upon by most internet users, and where it involves advertising or a false return address it is particularly disliked. SPAM
Stands for Uniform Resource Locator, the technical term for the address of a website or document on the web (e.g. www.bbc.co.uk). URL
A series of letters and numbers you type into your computer, email account or other computer network service to tell it who you are. Username
Pieces of code that are designed to reproduce and damage data or system performance. There are thousands of viruses and the numbers keep growing. Virus
Software which allows you to surf the internet. Webbrowser
Text which is arranged in a non-linear fashion and which you continue reading by clicking on links. Hypertext
A small picture which, when you click on it launches an application, program or acts like a link on the World Wide Web. Icon
The folder in your email program / webmail where you get your incoming emails. Inbox
Millions of computers around the world connected together by telephone lines, cables or satellites. Internet
One of the most popular web browsers, designed by Microsoft. InternetExplorer
Internet Service Provider. An ISP is the company that provides internet connections. ISP
Direct marketing sent by email rather than by the post. Junk Junkemail
A small, portable computer which can be battery operated as well as run from the mains. Laptop
Words or pictures you can click on which take you from somewhere (an internet page, an email message etc.) to somewhere else (another page, a picture etc.). Link
Using a username and password to prove your identity so that you can enter your computer or internet account. Loggingin
A family of computers developed by Apple. Macintosh
The folder which contains a person’s individual items such as an inbox, outbox, sent items, notes and calendar. Mailbox
The storage and thinking parts of your computer. More storage ? on your hard disk (ROM) means you can save more files and more thinking ? (RAM) means your computer can perform more complex tasks quicker. Memory
The display screen on your computer. Monitor
Describes when your computer is not connected to the internet. Offline

Digital Citizenship crossword

Type
Crossword
Description

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames

Computer Safety Word Search

Type
Word Search
Description

Attachment
Spam
Email
Hacker
Bowser
Social
Password
Phishing
Firewall
Viruses
Illegal
Downloading
Internet
Software
Spyware