Type
Crossword
Description

This crossword contains the following questions and answers:

the place or type of place where a plant or animal natrully or normally lives or grows habitat
a usual way of behaving habit
a person or animal that lives in a particular place inhabitant
done regularly or repeatedly habitual
to live in a place inhabit
to keep someone from doing what she or he wants to do inhibit
to order someone to not use or do something prohibit
to show or reveal something exhibit
an event at which objects are put out for people to look at exhibition
a nervous feeling that prevents you from expressing your thoughts, feelings, and desires inhibition
difficult to understand cryptic
the process of writing or reading secret messages or codes cryptography
a person who writes or reads secret messages or codes cryptographer
a message that is written in code cryptogram
to change information from one form to another especially to hide its meaning encrypt

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

    Customize    

POSITIVE COPING SKILLS Word Search

Type
Word Search
Description

This word search contains the following answers:

COLOR
COOK
DANCE
DO A PUZZLE
DRAW
EXCERCISE
HUG A PILLOW
PLAY A GAME
PLAY SPORTS
PLAY VIDEO GAMES
READ A GOOD BOOK
RIDE A BIKE
SEE A MOVIE
SING
TAKE A WALK
TALK TO SOMEONE
WATCH FUNNY VIDEOS
WATCH TV
WRITE A LETTER
WRITE IN A JOURNAL

    Customize    

Digital Technology Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

English 2 crossword puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

a brief statement or account of the main points of something. Summary
combine (a number of things) into a coherent whole. Synthesize
Connecting background knowledge to what you are reading Making connections
of or relating to sensation or the physical senses; transmitted or perceived by the senses. Sensory
a conclusion reached on the basis of evidence and reason Inferences
examine methodically and in detail the constitution or structure of (something, especially information), typically for purposes of explanation and interpretation. Analyze
evidence from a text (fiction or nonfiction) that you can use to illustrate your ideas and support your arguments. Textual evidence
Refers to information that is implied or inferred because it's not clearly stated Draw conclusions
the objective analysis and evaluation of an issue in order to form a judgment Critical thinking
the subject of a talk, a piece of writing, a person's thoughts, or an exhibition; a topic. Theme
language that uses words or expressions with a meaning that is different from the literal interpretation. Figurative language
the patterns of rhythm and sound used in poetry. Prosody
a piece of writing that partakes of the nature of both speech and song that is nearly always rhythmical, usually metaphorical, and often exhibits such formal elements as meter, rhyme, and stanzaic structure. Poem
elements are a strong visual means of indicating relationships. Graphic elements
literary work in which special intensity is given to the expression of feelings and ideas by the use of distinctive style and rhythm; poems collectively or as a genre of literature. Poetry
the use of symbols to represent ideas or qualities. Symbolism
a story, poem, or picture that can be interpreted to reveal a hidden meaning, typically a moral or political one. Allegory
an expression designed to call something to mind without mentioning it explicitly; an indirect or passing reference. Allusion

    Customize    

Technology Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

The opening page of a website. homepage
A computer language used to create web pages. HTML
A file format for compressing pictures JPEG
A link from a hypertext file or document to another location or file, activated by clicking on a highlighted word or image on the screen. hyperlink
The ability to use technology to find, organize, and evaluate information. digitalliteracy
A group of networked computers that share a common address (.edu, .com). Domain
The process of converting data into code. encryption
A security system that protects a network. firewall
A way to narrow search results by using the operators AND, OR, & NOT. BooleanLogic
A temporary storage place for quick retrieval of frequently used data. cache
A small text file stored in a computer’s hard drive by a website. cookie
An organized collection of information that is searchable. database
To practice appropriate and responsible behavior when using technology digitalcitizenship
The text field in a web browser where an URL is displayed or typed. addressbar
The amount of data that can be sent through a connection at one time. bandwidth
To save the URL of a webpage for easy access in the future. bookmark
Instructions you input for a computer to follow. code
The action of writing CODE or instructions for the computer to follow. programming
An unit of memory (8 binary digits represent a character). byte
Central Processing Unit- The brain of the computer. cpu
A program that searches for items in a database or sites on the WWW. searchengine
Uniform Resource Locator- The address of a resource on the WWW. url
A program used to navigate the WWW. browser
The global system of interconnected computer networks that link billions of devices. internet
A set of computers connected together for the purpose of sharing resources. network
Hyper Text Transfer Protocol- the set of rules for transferring files on the World Wide Web. http

    Customize    

Python Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Personal Digital Assistant PDA
A person who writes computer programs Programmer
Programming Language Python
Represented all in zeros and ones Machine Language
Reads the source code of the program as written by programmers Interpreter
Text editor to write instructions into a file Script
Sequence of Python states that have been crafted to do something Program
Perform some set of statements repeatedly, usually with some variation Repeated Execution
Get data from the “outside world”. Input
Display the results of the program on a screen or store them in a file Output
Perform statements one after another in the order they are encountered in the script. Sequential Execution
Check for certain conditions and then execute or skip a sequence of statements Conditional Execution
when your program has good syntax but there is a mistake in the order of the statements Logic Errors
A property of a program that can run on more than one kind of computer Portability
An instruction that causes the Python interpreter to display a value on the screen Print Statement
The process of formulating a problem, finding a solution, and expressing the solution Problem Solving
A set of instructions that specifies a computation Program
When a program displays a message and pauses for the user to type some input to the program Prompt
Stores programs and data and retains its information even when the power is turned off. Secondary Memory
The meaning of a program Semantics
An error in a program that makes it do something other than what the programmer intended Semantic Error
A program in a high-level language Source Code

    Customize    

Speech Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

To restate or summarize Paraphrase
Paying attention to what we hear Listening
Vibration of sound waves on the eardrum Hearing
"Undivided attention" Active listening
Presenting something thats not yours Plagiarism
1st 10 Amendments Bill of Rights
Hormones released into a bloodstream Adrenaline
A message is communicated Channel
A person who recieves a message Listener
Person who tells the message Speaker
Anything that a speaker communicates to someone else Message
Nonverbal messages sent from listener to a speaker Feedback
Time or place where speech takes place Situation
Rights/Wrongs in human affair Ethics
"400 to 800 words a minute" Spare
Nervous to talk in front of people Stage fright
Focused, organized thinking Critical

    Customize    

E-Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable

    Customize    

E.O.G Vocabulary Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Something used to represent something else Symbol
q reference within a work o something famous outside it Allusion
the way people speak in a certain location Dialect
who is telling the story Point Of View
Main character tells the story First Person P.O.V
Narrator addresses the audience Second Person P.O.V
Fouces on one character Third Person L.P.O.V
Narrator knows about all the characters Third Person O.P.O.V
Addressing an opposing argument Counter
To convince or get someone to believe or do something Persuasive
Authors attitude or feelings Tone
the readers feelings Mood
descriptive words; lots of details Describes
Reason why author write's Author Purpose
Comparison Analogies
To suggest without saying exactly Imply
Drawing conclusions; reading between the lines Infer
The big picture of text Main Idea
Distinctive way an author writes Style
A reason behind a thought, action or event Cause

    Customize