Type
Crossword
Description

This crossword contains the following questions and answers:

A _______ is a program that allows a user to find, view, hear, and interact with material on the Internet. BROWSER
A computer _______ is a group of interconnected computers. NETWORK
A ____ Room is a place or page in a website or online service where people can type messages which are displayed almost instantly on the screens of others who are in the room. CHAT
A computer ____ can be considered as the modern counterpart of a paper document which traditionally was kept in offices. FILE
Software ______ is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation software products or unauthorized versions of software products. PIRACY
____ is a method of writing, sending, receiving and saving messages over an electronic communication system such as the Internet. EMAIL
Always include a clear and specific _______ line in your email. SUBJECT
_______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft. SPYWARE
__________ is the scrambling of data into a secret code that can be read only by software set to decode the information. ENCRYPTION
Don’t share your user __ ID
A ________ is hardware or software that helps keep hackers from using your computer to send out your personal information without your permission. It watches for outside attempts to access your system and block communications to and from sources you don’t permit. FIREWALL
A ______ is a segment of Internet space denoted by the function or type of information it includes. Current ones include “.com” for commercial sites, “.gov” for governmental ones, and “.org” for non-commercial organizations. DOMAIN
A _____ is a program that can sneak onto your computer – often through an email attachment – and then make copies of itself, quickly using up all available memory. VIRUS
A Complex Password must be at least ____ characters long. NINE
Before you throw something in the _____, ask yourself, “Is this something I would give to an unauthorized person or want to become publicly available?” TRASH
A _______ Password contains at least 3 of the 4 following characters:Lowercase Alpha (e.g. abc), Uppercase Alpha (e.g. ABC), Numeric (e.g.123), Special/Non-Alphanumeric (e.g. ! $ # %). COMPLEX
To ______ the amount of spam you receive, be careful who you give your email address to. REDUCE
Only _____ invalid login attempts are permitted before the account is locked. THREE
A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down. WORM
Always check your and in your email before sending it. SPELLING
Email ____, also known as unsolicited bulk email (UBE) or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. SPAM
______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals. SOCIAL
Never use email for any _______ or unethical purpose. ILLEGAL
________ is a scam that involves Internet fraudsters who send spam or pop-up messages to lure personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims. PHISHING
The __ Address is a computer’s “address” and consists of a series of numbers separated by periods. IP
______ is a type of software that often comes with free downloads.Sometimes it displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use. ADWARE

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

technology Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

company of the type of touch screen phone most of the world uses today apple
does not eliminate servers serverless computing
a video adapter video card
is the integration of digital information with live video augmented reality
a conventional method of transmitting data Analogue
is software that allows you to view a PDF document Adobe Acrobat Reader
is a document sent with an email message Attachment
refers to the part of an application that performs an essential task not apparent to the user Back-end
smallest unit of measurement in computing. bit
a wireless communications technology intended to replace cables bluetooth
a saved link to a particular Web page bookmark
to load and initialise the operating system on a computer. boot
A software program that allows you to surf the web Browser
is temporarily stored on your computer. Cache
microprocessor that performs many functions and calculations that make your computer run Chip
refers to a website's text and information, as opposed to its design and structure Content
refers to measures designed to protect your computer Cybersecurity
a small program that allows a peripheral device such as a printer or scanner to connect to your PC Device driver
method by which users access and save or "pull down" software or other files to their own computers Download
electronic mail is a way of sending messages over the internet Email

    Customize    

Digital Technology Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

    Customize    

Technology Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

    Customize    

Computer Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Small circuit board that controls processing within a computer microprocessor
Physical parts of a computer Hardware
A program that contains instructions for a computer Software
Applications are also known as Apps
Consists of information Message
Refers to the method used to enter or transmit your message to a computer Input
Information or data retrieved or received from a computer Output
"Brain of the computer" CPU
Input/Output device that reads data from and writes data to a disK Diskdrive
Output device that displays text and graphics on a screen Monitor
Input device used for commands and navigation Mouse
Input device with an arrangement of letters, etc. Keyboard
First line of defense Password
An unauthorized user able to access and misuse information Hacker
A destructive program loaded onto a computer Virus
Defamation by written or printed words or pictures Libel
Defamation by oral utterance Slander
A program that allows users to view web pages and online information Browser
Sotware that has been written to detect, isolate, and destroy viruses Antivirusprogram
A web address URL
Any word, phrase, or picure that, when clicked, take the user to another location Hyperlink
Electronic mail Email
Playing video and sound in real time Streaming
Retrieving somehting fromt he internet and storing it on a disk drive Downloading
Using material antoher person has created and claims it as your own Plagiarism

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A form of malicious code that displays unsolicited advertising on your computer. Adware
A saved link to a website that you can click on rather than retyping the web address. Bookmark
A program that les you find, see, and hear material on web pages. Browser
A Friends a user interacts with online through various media such as instant message and chat. Buddies
A location online that allows multiple users to communicate electronically with each other in real time. Chatroom
A piece of information about your visit to a website that some websites record automatically on your computer. Cookie
People who willfully and repeatedly inflict harm through the medium of electronic text such as emails, blogs, or social network posts. Cyberbullies
To copy a file from one computer system to another via the internet. Download
Allows you to block certain types of content from being displayed. Filtering
A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer. Firewall
Participating in internet games which can be played individually or by multiple online users at the same time. Gaming
A tracking feature of Internet browsers that shows all the recent websites visited. History
The site that is the starting point on the web for a particular group or organization. Homepage
Private, real-time text conversation between two users (2 words). Instant Messaging
Stands for malicious sofware or code, that is designed to damage the computer or collect information. Malware
The act of parents tracking the websites or e-mail messages that a child visits or reads. Monitoring
Rules or manners for interacting courteously with others online. Netiquette
Specific features or software that allow parens to manage the online activities of children (2 words). Parental Controls
A secret word or number tha must be used to gain access to an online service. Password
A type of online fraud, where someone tries to trick the victime into revealing sensitive details. Phishing
Online communities where people share infomration about themselves (2 words). Social Media
Any unsolicited e-mail, or junk mail. Spam
A wide variety of software installed on people's computers, which collects information about you withour knolwedge or conesnt and sends it back to whoever wrote the program. Spyware
Browsing around various websites following a particular personal interest. Surfing
To send information from your computer to another computer. Upload
The name a suer selects to be identified on a computer, network, or in an online gaming forum. Username
A software program that typically arrives through email attachments and quickly exhausts the computer's memory. Virus

    Customize    

Cyberbullying Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

An image or user name that represents a person online. Avatar
The denial of access to particular parts of the internet. Blocking
Interactive web journal or diary posted online. Blog
Repeated and deliberate harassment directed at another person. Bullying
Intentional & repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Cyberbullying
Suicide caused directly or indirectly from cyberbullying. Cyberbullicide
Repeated harassment using electronic devices and networked technology that includes threats of harm. Cyberstalking
Evidence of a person's use of the internet. Digital Footprint
Intentionally excluding someone from an online group, like a buddy list or a game. Exclusion
The act of restricting access to certain websites. Filtering
Hardware or software that restricts and regulates incoming and outgoing data to or from computer systems. Firewall
Online fights using electronic messages with angry and vulgar language. Flaming
Repeatedly sending offensive, rude, or insulting messages. Harassment
Breaking into someone's account, posing as that person and sending messages to make the person look bad. Impersonation
An image with text used to describe a thought, idea, or joke that is widely shared. Meme
The one who instigates online social cruelty. Also know as the aggressor. Offender
Sharing someone's secrets or embarrassing information online. Outing
Software or a website that allows one's internet connection to be routed or tunneled through a different connection or site. Proxy
Making a statement or taking an action that indicates harm to another. Threat
A person who is known for creating controversy in an online setting. Troll
The person who is on the receiving end of online social cruelty Victim

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize