Type
Crossword
Description

This crossword contains the following questions and answers:

What type of information must not be shared with others online? Personal
How long does information online remain accessable for? Forever
Privacy settings should remain _________ at all times. Strict
Saftey ___________ should also extend to other devices. Precautions
Who must you not accept phone calls from? Strangers
Passwords must be private and __________ . Unpredictable
What do device updates protect against? Viruses
Downloads must not occur without adult __________ . Permission
Who must you inform if you recieve offensive or strange messages? An adult
You must not send _________ to stangers. Pictures

    Customize    

OPSEC is not Puzzling Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What you should do to your anti-virus software on a regular basis UPDATE
What you should do to all papers with PII or other sensitive information SHRED
Where you should keep your badge when off-site Outofsite
An adversary is considered a _________ THREAT
"Computer1234" would be a bad example of this PASSWORD
Actions that mitigate a threat COUNTERMEASURES
An option to protect your credit FREEZE
What potential harm from poor OPSEC is called RISK
What you must do to emails containing Critical Information ENCRYPT
What a weakness in our practices or defenses is called VULNERABILITY
The type of information that OPSEC protects CRITICALINFORMATION
The number of steps in the OPSEC process FIVE
The Freedom of Information Act is for what type of information FOUO
It is very important to use privacy settings on _______________ SOCIAL MEDIA
What you should remove each time you walk away from your NMCI computer CAC
What you cannot take with your smartphone or camera anywhere onsite PICTURES
What you should practice whenever you discuss your work with anyone NEED TO KNOW
OPSEC is a _______ effort TEAM
What is the abbreviation of the list that shows the commands Critical Information CIL
The kind of email account you can't use to conduct Government business PERSONAL

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

meet online
family values
uncomfortable
parent permission
responsible
school students
kids rules
younger children
telephone number
posting pictures
technology
online citizen
downloading
tell parents
trust
personal files
public place
passwords
nostrangers
antivirus software
home computer
cyber citizen
Personal Information
Internet Safety

    Customize    

Cyber Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

    Customize    

HIPAA COMPLIANCE TRAINING Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

I can not take _______________ inside the Hospital. Selfies
What do the initials ePHI stand for electronically Protected Health _________ ? Information
Abbreviation for the Health Insurance Portability and Accountability Act of 1996? HIPAA
Every patient has the right to ___________ with their medical treatment and conditions. Privacy
By law hospitals must train annually on HIPAA ____________. Compliance
Hospitals have ___________ and procedures to meet Federal HIPAA rules and regulations. policies
If you suspect someone is violating the facility's privacy policy , you should? report
HIPAA security and privacy applies to everyone ______ in the facility. working
HIPAA is governed by _____ and Human Services? Health
HIPAA was created with _____ standards for all patients. Security
Accessible __________ Health Information (PHI) is limited to only that information needed for performance of services. Protected
Personally identifiable health information is protected by HIPAA includes photographic, electronic, spoken word and ______? Paper
I may not post any identifiable information on______? Social media
All information regarding patients must stay confidential. I can not even tell my friends or ____. Family
I may not share my computer log-in _____ with anyone. Password

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

Computer Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Small circuit board that controls processing within a computer microprocessor
Physical parts of a computer Hardware
A program that contains instructions for a computer Software
Applications are also known as Apps
Consists of information Message
Refers to the method used to enter or transmit your message to a computer Input
Information or data retrieved or received from a computer Output
"Brain of the computer" CPU
Input/Output device that reads data from and writes data to a disK Diskdrive
Output device that displays text and graphics on a screen Monitor
Input device used for commands and navigation Mouse
Input device with an arrangement of letters, etc. Keyboard
First line of defense Password
An unauthorized user able to access and misuse information Hacker
A destructive program loaded onto a computer Virus
Defamation by written or printed words or pictures Libel
Defamation by oral utterance Slander
A program that allows users to view web pages and online information Browser
Sotware that has been written to detect, isolate, and destroy viruses Antivirusprogram
A web address URL
Any word, phrase, or picure that, when clicked, take the user to another location Hyperlink
Electronic mail Email
Playing video and sound in real time Streaming
Retrieving somehting fromt he internet and storing it on a disk drive Downloading
Using material antoher person has created and claims it as your own Plagiarism

    Customize    

E Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

You need to keep this secret and make it hard to guess password
You should never accept these from stangers friend request
Someone who hurts you feelings by sending nasty messages cyber bully
This can attack your computer virus
You should never give this out online personal information
You should never arrange to do this with people you don't know Meet up
What you should do to people who send you nasty messages Block
These are people you don't know strangers
If you see something that upsets you who should you tell? parents
You should never send this to people online picture

    Customize    

Digital Literacy Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

electronic devices and media platforms such as computers, cell phones, video, the Internet, and video games that allow users to create, communicate, and interact with one another or with the device or application itself digital media
a figure of speech in which a comparison is made between two different things using the word like or as simile
navigating the digital world safely, responsibly, and ethically digital citizenship
a representation of someone or something, such as a photograph or drawing; the way someone or something is perceived by others image
a rule that is unfairly applied to different people or groups of people double standard
a set of principles and morals governing people’s behavior, including honesty and respect toward others ethics
a set of principles and morals governing people’s behavior as it relates to the Internet and digital devices online ethics
to depict yourself to others as being a certain way or having particular characteristics represent
an image and personality that you show to others persona
a graphic image that represents a person online avatar
without a name or other information that identifies who you are anonymous
the effect of something that happened earlier consequence
all of the information about a person that can be found online digital footprint
to let in or to be given entrance admission
someone seeking entrance to a school or placement in a job, usually competing with others for the position candidate
the general impression of a person held by others and the public reputation
to continue and endure persist
different factors that surround a piece of information that help determine its meaning context
a person or company other than you and the owner of the website you visit third party
choices a website might give you about what it does with your information privacy options
when companies collect information about you based on your online behavior track
when companies tailor content to you based on the information they have collected about you target
common categories of the population, such as age, gender, and race demographic
data files that are stored on your computer when you visit certain sites, often used by companies to identify repeat customers and personalize visitors’ experiences cookies
knowledge collected from many people towards a common goal collective intelligence
a website created by a group that allows all users in a group to add or edit content wiki
the ability to use a small amount of someone’s creative work without permission, but only in certain ways fair use
a use in connection with a business, usually for profit commercial purposes
a law that protects a creator’s ownership of and control over the work he or she creates, requiring other people to get the creator’s permission before they copy, share, or perform that work copyright
creative work that’s not protected by copyright and is therefore free for one to use however one wants public domain
an idea –whether a phrase, expression, image, or video – that gains widespread recognition online viral: the rapid spread of information, particularly meme
the view or outlook of someone, based on their thoughts, feelings, experiences, and background perspective
a person who is the object of an intentional action target
a person who intentionally commits acts to hurt or damage someone offender
a person who passively stands by and observes without getting involved bystander
a person who supports and stands up for someone else upstander
to increase or make more intense escalate
to decrease or make less intense de-escalate

    Customize    

Digital Citizenship crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

controlled by or connected to another computer or network online
working surface of a desk desktop
legal right given to an originator to print, publish, perform, film, or record the originator's work. copyright
any message passed through digital devices. digital communication
where computer networkers where users can communicate. chat room
regularly updated website or web page, typically one run by an individual or small group blog
capable of copying itself and destroying data. virus
electronic communication used to bully a person or a group of people. cyberbullying
applications that enable users to create and share content or to participate in social networking. social media
set of rules you should follow in order to make the internet better for others, and better for you. digital etiquette
acquisition and use of a person's private identifying information identity theft
A hostile, strongly worded message that may contain obscene language. flame
specific features or software that parents manage the online activities of children parental control
any device used to communicate provocative messages and/or sexual images sexting
A program, or set of instructions, that runs on a computer. software

    Customize