A _______ is a program that allows a user to find, view, hear, and interact with material on the Internet.
BROWSER
A computer _______ is a group of interconnected computers.
NETWORK
A ____ Room is a place or page in a website or online service where people can type messages which are displayed almost instantly on the screens of others who are in the room.
CHAT
A computer ____ can be considered as the modern counterpart of a paper document which traditionally was kept in offices.
FILE
Software ______ is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation software products or unauthorized versions of software products.
PIRACY
____ is a method of writing, sending, receiving and saving messages over an electronic communication system such as the Internet.
EMAIL
Always include a clear and specific _______ line in your email.
SUBJECT
_______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.
SPYWARE
__________ is the scrambling of data into a secret code that can be read only by software set to decode the information.
ENCRYPTION
Don’t share your user __
ID
A ________ is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission. It watches for outside attempts to access your system and block communications to and from sources you don’t permit.
FIREWALL
A ______ is a segment of Internet space denoted by the function or type of information it includes. Current ones include “.com” for commercial sites, “.gov” for governmental ones, and “.org” for non-commercial organizations.
DOMAIN
A _____ is a program that can sneak onto your computer – often through an email attachment – and then make copies of itself, quickly using up all available memory.
VIRUS
A Complex Password must be at least ____ characters long.
NINE
Before you throw something in the _____, ask yourself, “Is this something I would give to an unauthorized person or want to become publicly available?”
TRASH
A _______ Password contains at least 3 of the 4 following characters:Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g.123), Special/Non-Alphanumeric (e.g. ! $ # %).
COMPLEX
To ______ the amount of spam you receive, be careful who you give your email address to.
REDUCE
Only _____ invalid login attempts are permitted before the account is locked.
THREE
A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down.
WORM
Always check your and in your email before sending it.
SPELLING
Email ____, also known as unsolicited bulk email (UBE) or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
SPAM
______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals.
SOCIAL
Never use email for any _______ or unethical purpose.
ILLEGAL
________ is a scam that involves Internet fraudsters who send spam or pop-up messages to lure personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims.
PHISHING
The __ Address is a computer’s “address” and consists of a series of numbers separated by periods.
IP
______ is a type of software that often comes with free downloads.Sometimes it displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use.
ADWARE

Preview of Crossword

Make this Crossword your own

Add, edit, delete clues, and customize this crossword. Print copies for an entire class. All in 5 minutes.

Icon crossword    Create my Crossword now    

Your customized Crossword will be in your hands in five minutes.

Related Puzzles

Internet Terms

10 terms
Created on Feb 19, 2016

Internet Safety

10 terms
Created on Feb 22, 2016

Cyber Security

15 terms
Created on Mar 23, 2016

Digital Technology

15 terms
Created on Mar 23, 2016

Cyber Security

20 terms
Created on Apr 25, 2016

technology

20 terms
Created on May 17, 2016

Computer Terms

15 terms
Created on Jun 16, 2016

Technology Crossword Puzzle

15 terms
Created on Aug 4, 2016

Computer Basics !

20 terms
Created on Aug 12, 2016

Introduction to Web Design- Crossword 1

18 terms
Created on Sep 13, 2016

Computer Crossword Puzzle

19 terms
Created on Sep 22, 2016

E-Safety

20 terms
Created on Nov 15, 2016

Computer Safety

25 terms
Created on Jan 9, 2017

Cyberbullying

21 terms
Created on Jan 30, 2017

Internet Safety Crossword

27 terms
Created on Apr 5, 2017

Internet Safety

15 terms
Created on Apr 26, 2017

IT&S Cyber Security Crossword Puzzle

16 terms
Created on Jun 2, 2017

OPSEC is not Puzzling

20 terms
Created on Nov 14, 2017

Cyber Safety

13 terms
Created on Feb 9, 2018

Key Skills

51 terms
Created on Aug 2, 2018