Type
Word Search
Description

This word search contains the following answers:

operating sftware
utility
programs
application
hardware
software
social networking
operation
crime
offence
modify
permission
File explorer
key combinations
file management
file extensions
doc.
executable file
Undo
copy
alter data
cyber bullying
copy right
replicate
worm
virus
Hacking
password

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Computer Terms Word Search

Type
Word Search
Description

This word search contains the following answers:

Bit
Browser
Clip art
computer
copy
data
delete
desktop
digital
disk
drag
email
Excel
File
flash
flash drive
folder
font
hyperlink
Keyboard
link
log out
login
memory
modem
monitor
Mouse
Page
password
paste
Power
ram
rom
runtime
save
scroll
server
spyware
storage
surf
text
toolbar
trash
undo
URL
username
utility
virus
web
Word

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

    Customize    

Internet Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Trying to steal other people's sensitive information Phishing
Trying to break into computer systems Hacking
Software programs designed to corrupt computers Virus
Software protecting computers from danger Firewall
Being pursued by someone through the anonymity of social media Cyberstalking
Symbol to look for before entering ANY personal details Padlock
Being harrassed or threatened online Cyberbullying
Most commonly used password Password
Protection for your computer Antivirus Software
Files sent through email Attachments

    Customize    

Internet Safety Word Search

Type
Word Search
Description

This word search contains the following answers:

meet online
family values
uncomfortable
parent permission
responsible
school students
kids rules
younger children
telephone number
posting pictures
technology
online citizen
downloading
tell parents
trust
personal files
public place
passwords
nostrangers
antivirus software
home computer
cyber citizen
Personal Information
Internet Safety

    Customize    

Computer Crimes Word Search

Type
Word Search
Description

This word search contains the following answers:

Firewall
Video cameras
Security guards
Biometric systems
Archiving
Locks
Passwords
Antivirus software
Encryption
Cyber crime
Illegal
Identity theft
Internet fraud
Computer fraud
Worm
Virus creation
Software piracy
Phishing
Electronic eavesdropping
Industrial espionage
Hacking
Cyber bullying
Crime
Computer

    Customize    

Cyber Safety Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Protection for your computer Antivirussoftware
Sending a fake email to steal other people's information Phishing
Being harrassed or threatened online Cyberbullying
Being pursued by someone online through social media Cyberstalking
Software protecting computers from danger Firewall
Software programs designed to corrupt computers Virus
Trying to break into computer systems Hacking
Something you need from your parents before purchasing something Permission
The use of technologies to protect computers and data from strangers CyberSafety
A common internet breach, stealing information for themselves IdentityTheft
Someone who has knowledge in programming and computers Hacker
Someone who intentionally and illegally hacks into another person’s system to obtain information Cracker
Something you shouldn't give online Password

    Customize    

technology Word Search

Type
Word Search
Description

This word search contains the following answers:

social network
software
monitor
cyberbully
modem
keyboard
hardware
mouse
network
firewall
Flash Drive
Personal Computer
email
network
dropbox
blog
technology
har drive
Operating System
digital citizenship

    Customize    

Computer Basics Wordsearch

Type
Word Search
Description

This word search contains the following answers:

resolution
sound bar
screen shot
memory
flash drive
monitor
output
input
windows
trash
system files
hardware
software
scroll bar
save
resize
recycle bin
ram
pointer
operating system
mouse
menu
macintosh
megahertz
megabytes
list view
keyboard
folder
edit
drag
double click
icons
files
documents
disk space
directory
dialog box
desktop
delete
crash
cpu
computer
close
click
application

    Customize    

Computer Science Vocab Word Search

Type
Word Search
Description

This word search contains the following answers:

ZIP FILE
WINDOWS
BROWSER
WEB
VIRUS
USERNAME
USB
UPLOAD
HORSE
TROJAN
TERAFLOP
SPYWARE
SOUNDCARD
SMILEY
SERVER
SCROLL
SAVE
RESOLUTION
REBOOT
PRINTER
PORT
PERIPHERAL
PCI
PASSWORD
OPEN
NETIQUETTE
MULTIMEDIA
MODEM
MENU
LINUX
KEYBOARD
JPEG
JAVA
INPUT
HARDWARE
HACKER
GIGABYTE
FREEWARE
FONT
FIREWIRE
FAQ
ETHERNET
EMOTICON
DRIVER
DOWNLOASD
DOCUMENT
DISK
DESKTOP
DATABASE
CYBERSPACE
CRASH
CPU
COPY
CHIP
CACHE
BUG
BIOS
BANDWIDTH
ASCII

    Customize