Type
Word Search
Description

This word search contains the following answers:

Danger
Username
Passwords
Internet
Anti-virus
IP
Code
Hacking
Facebook
jakepaul
Gaming
Media
Dark web

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Cyber Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

    Customize    

Computer Terms Word Search

Type
Word Search
Description

This word search contains the following answers:

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A form of malicious code that displays unsolicited advertising on your computer. Adware
A saved link to a website that you can click on rather than retyping the web address. Bookmark
A program that les you find, see, and hear material on web pages. Browser
A Friends a user interacts with online through various media such as instant message and chat. Buddies
A location online that allows multiple users to communicate electronically with each other in real time. Chatroom
A piece of information about your visit to a website that some websites record automatically on your computer. Cookie
People who willfully and repeatedly inflict harm through the medium of electronic text such as emails, blogs, or social network posts. Cyberbullies
To copy a file from one computer system to another via the internet. Download
Allows you to block certain types of content from being displayed. Filtering
A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer. Firewall
Participating in internet games which can be played individually or by multiple online users at the same time. Gaming
A tracking feature of Internet browsers that shows all the recent websites visited. History
The site that is the starting point on the web for a particular group or organization. Homepage
Private, real-time text conversation between two users (2 words). Instant Messaging
Stands for malicious sofware or code, that is designed to damage the computer or collect information. Malware
The act of parents tracking the websites or e-mail messages that a child visits or reads. Monitoring
Rules or manners for interacting courteously with others online. Netiquette
Specific features or software that allow parens to manage the online activities of children (2 words). Parental Controls
A secret word or number tha must be used to gain access to an online service. Password
A type of online fraud, where someone tries to trick the victime into revealing sensitive details. Phishing
Online communities where people share infomration about themselves (2 words). Social Media
Any unsolicited e-mail, or junk mail. Spam
A wide variety of software installed on people's computers, which collects information about you withour knolwedge or conesnt and sends it back to whoever wrote the program. Spyware
Browsing around various websites following a particular personal interest. Surfing
To send information from your computer to another computer. Upload
The name a suer selects to be identified on a computer, network, or in an online gaming forum. Username
A software program that typically arrives through email attachments and quickly exhausts the computer's memory. Virus

    Customize    

Social Media Awareness Word Search

Type
Word Search
Description

This word search contains the following answers:

Friend request
Dangerous
Twitter
Texting
Social media
Web cam
Passwords
Login
Strangers
Snap chat
Cyber
Internet Safety
Instagram
Facebook
Bullying

    Customize    

Digital Citizenship crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

bullying through the internet Cyberbullying
An email from a fake bank is an example of what? Sceme
Thinking something is one thing when its not Scam
acts as a lock for online accounts password
what you leave behind on the internet digital footprint
rules you have to follow Policy
Steps you need to follow Procedures
Unnecessary issues that are usually over exaggerated Drama
Social networking digital media
Share to much information oversharring
when people track information to steal stuff from you tracking
interacting with other people communication
instantly communicating instant messaging
A profile character avatar
gaming online videogames

    Customize    

Computer Science Vocab Word Search

Type
Word Search
Description

This word search contains the following answers:

ZIP FILE
WINDOWS
BROWSER
WEB
VIRUS
USERNAME
USB
UPLOAD
HORSE
TROJAN
TERAFLOP
SPYWARE
SOUNDCARD
SMILEY
SERVER
SCROLL
SAVE
RESOLUTION
REBOOT
PRINTER
PORT
PERIPHERAL
PCI
PASSWORD
OPEN
NETIQUETTE
MULTIMEDIA
MODEM
MENU
LINUX
KEYBOARD
JPEG
JAVA
INPUT
HARDWARE
HACKER
GIGABYTE
FREEWARE
FONT
FIREWIRE
FAQ
ETHERNET
EMOTICON
DRIVER
DOWNLOASD
DOCUMENT
DISK
DESKTOP
DATABASE
CYBERSPACE
CRASH
CPU
COPY
CHIP
CACHE
BUG
BIOS
BANDWIDTH
ASCII

    Customize    

Social Media Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A self portrait taken using the reverse camera screen on a smartphone Selfie
Texting is a ______________ __________________ while driving and can lead to death Dangerous distraction
Cyberbullying can be _____________. Know how to stop it before it starts prevented
Using the social media to send or post text or images to hurt or embarrass another person is called ______________. Cyberbullying
This helps give additional safety for kids and teens, allowing them to keep in touch with family and friends Cellphones
Participants in these rooms are not necessarily teens Chat
This has overtaken the frequency of every other form of interaction among teens Texting
Social Media is a wonderful __________ yet you must know how to use it safely. Tool
A cell phones _________ can provide others with your exact physical location GPS
The internet has a great ____________. Watch what you post as you'll have to live with it for a very long time. memory
___________________ __________________ use chat rooms to "meet" someone Sexual predators
Only ____________ someone online who you know in person Friend
Refuse to pass along cyberbullying ____________ Messages
If you encounter someone who is unpleasant or hostile online, ___________ them and report to a trusted adult. Block
Beware of emails trying to _____________ you something Sell
_____________ give your username and password to someone else Never

    Customize