Type
Crossword
Description

To threaten, intimidate or bully someone through online communication (13) cyberbullying
Someone who deliberately makes offensive posts online (5) troll
Something designed to keep your personal information and websites safe so that others can't access them (8) password
A good password contains numbers, symbols, uppercase letters and .......... letters (9) lowercase
You shouldn't download things without permission in case you get a ..... (5) virus
To keep your social media accounts secure, you need good ....... settings (7) privacy
A popular website designed for sharing videos (7) youtube
Never send a ..... of yourself to someone online without your parents' permission (5) photo
Never agree to meet someone face-to-face who you've met ...... (6) online
Never give out your name, date of birth or any other personal ........... online (11) information
Make sure that you have got your parents' .......... before buying anything online or accepting a friend request (10) permission
You have to be careful online because people can ....... to be someone else (7) pretend
The internet is useful for many things, but it can be ......... if you don't use it safely (9) dangerous
Cyberbullying can have serious ............ (12) consequences
If something online makes you uncomfortable, tell a trusted ..... (5) adult
You can access the internet in many ways, e.g. laptops, tablets, ...... phones and game consoles (6) mobile

E-Safety Crossword

Type
Crossword
Description

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

Cyber Safety Crossword

Type
Crossword
Description

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

Cyberbullying Crossword

Type
Crossword
Description

An image or user name that represents a person online. Avatar
The denial of access to particular parts of the internet. Blocking
Interactive web journal or diary posted online. Blog
Repeated and deliberate harassment directed at another person. Bullying
Intentional & repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Cyberbullying
Suicide caused directly or indirectly from cyberbullying. Cyberbullicide
Repeated harassment using electronic devices and networked technology that includes threats of harm. Cyberstalking
Evidence of a person's use of the internet. Digital Footprint
Intentionally excluding someone from an online group, like a buddy list or a game. Exclusion
The act of restricting access to certain websites. Filtering
Hardware or software that restricts and regulates incoming and outgoing data to or from computer systems. Firewall
Online fights using electronic messages with angry and vulgar language. Flaming
Repeatedly sending offensive, rude, or insulting messages. Harassment
Breaking into someone's account, posing as that person and sending messages to make the person look bad. Impersonation
An image with text used to describe a thought, idea, or joke that is widely shared. Meme
The one who instigates online social cruelty. Also know as the aggressor. Offender
Sharing someone's secrets or embarrassing information online. Outing
Software or a website that allows one's internet connection to be routed or tunneled through a different connection or site. Proxy
Making a statement or taking an action that indicates harm to another. Threat
A person who is known for creating controversy in an online setting. Troll
The person who is on the receiving end of online social cruelty Victim

Social Media Crossword

Type
Crossword
Description

A self portrait taken using the reverse camera screen on a smartphone Selfie
Texting is a ______________ __________________ while driving and can lead to death Dangerous distraction
Cyberbullying can be _____________. Know how to stop it before it starts prevented
Using the social media to send or post text or images to hurt or embarrass another person is called ______________. Cyberbullying
This helps give additional safety for kids and teens, allowing them to keep in touch with family and friends Cellphones
Participants in these rooms are not necessarily teens Chat
This has overtaken the frequency of every other form of interaction among teens Texting
Social Media is a wonderful __________ yet you must know how to use it safely. Tool
A cell phones _________ can provide others with your exact physical location GPS
The internet has a great ____________. Watch what you post as you'll have to live with it for a very long time. memory
___________________ __________________ use chat rooms to "meet" someone Sexual predators
Only ____________ someone online who you know in person Friend
Refuse to pass along cyberbullying ____________ Messages
If you encounter someone who is unpleasant or hostile online, ___________ them and report to a trusted adult. Block
Beware of emails trying to _____________ you something Sell
_____________ give your username and password to someone else Never

Internet Safety Crossword

Type
Crossword
Description

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

Internet Safety Word Search

Type
Word Search
Description

meet online
family values
uncomfortable
parent permission
responsible
school students
kids rules
younger children
telephone number
posting pictures
technology
online citizen
downloading
tell parents
trust
personal files
public place
passwords
nostrangers
antivirus software
home computer
cyber citizen
Personal Information
Internet Safety

Digital Citizenship crossword

Type
Crossword
Description

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames

Internet Safety Crossword

Type
Crossword
Description

A form of malicious code that displays unsolicited advertising on your computer. Adware
A saved link to a website that you can click on rather than retyping the web address. Bookmark
A program that les you find, see, and hear material on web pages. Browser
A Friends a user interacts with online through various media such as instant message and chat. Buddies
A location online that allows multiple users to communicate electronically with each other in real time. Chatroom
A piece of information about your visit to a website that some websites record automatically on your computer. Cookie
People who willfully and repeatedly inflict harm through the medium of electronic text such as emails, blogs, or social network posts. Cyberbullies
To copy a file from one computer system to another via the internet. Download
Allows you to block certain types of content from being displayed. Filtering
A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer. Firewall
Participating in internet games which can be played individually or by multiple online users at the same time. Gaming
A tracking feature of Internet browsers that shows all the recent websites visited. History
The site that is the starting point on the web for a particular group or organization. Homepage
Private, real-time text conversation between two users (2 words). Instant Messaging
Stands for malicious sofware or code, that is designed to damage the computer or collect information. Malware
The act of parents tracking the websites or e-mail messages that a child visits or reads. Monitoring
Rules or manners for interacting courteously with others online. Netiquette
Specific features or software that allow parens to manage the online activities of children (2 words). Parental Controls
A secret word or number tha must be used to gain access to an online service. Password
A type of online fraud, where someone tries to trick the victime into revealing sensitive details. Phishing
Online communities where people share infomration about themselves (2 words). Social Media
Any unsolicited e-mail, or junk mail. Spam
A wide variety of software installed on people's computers, which collects information about you withour knolwedge or conesnt and sends it back to whoever wrote the program. Spyware
Browsing around various websites following a particular personal interest. Surfing
To send information from your computer to another computer. Upload
The name a suer selects to be identified on a computer, network, or in an online gaming forum. Username
A software program that typically arrives through email attachments and quickly exhausts the computer's memory. Virus

Internet Safety Crossword

Type
Crossword
Description

controlled by or connected to another computer or network online
working surface of a desk desktop
legal right given to an originator to print, publish, perform, film, or record the originator's work. copyright
any message passed through digital devices. digital communication
where computer networkers where users can communicate. chat room
regularly updated website or web page, typically one run by an individual or small group blog
capable of copying itself and destroying data. virus
electronic communication used to bully a person or a group of people. cyberbullying
applications that enable users to create and share content or to participate in social networking. social media
set of rules you should follow in order to make the internet better for others, and better for you. digital etiquette
acquisition and use of a person's private identifying information identity theft
A hostile, strongly worded message that may contain obscene language. flame
specific features or software that parents manage the online activities of children parental control
any device used to communicate provocative messages and/or sexual images sexting
A program, or set of instructions, that runs on a computer. software

Cyber Crossword !

Type
Crossword
Description

Something you have to use to get into your accounts. Password
Never give out __________ information about yourself. Personal
When on the internet say away from __________. Strangers
Never show anyone your. MEssages
Never meet anybody that you met online in person without , your parents . permission
__________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm. Safety
The process to verify that someone is who they claim to be when they try to access a computer or online service. Authentication
Someone who gains all access to your information without your permission is a ________. Hacker
Something that could cause an organization not to meet one of its objectives. Risk
Copying someone's work. Plagiarism
Someone that picks with someone over the internet. Cyberbully
The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this Cybersecurity
Meeting people online could be ______. Dangerous
a global computer network providing a variety of information and communication facilities is called the _________. Internet
Never ______ anyone over the internet trying to get you to give up information about yourself. Trust