Computers & IT Crossword Puzzles
Social Media
tiktok : users create music and lipsync videos they can share with their followers, facebook : currently the largest social media site in the world, instagram : …
Cyber Security Month
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , links: don’t click on these …
Computer
cpu: central processing unit , rom: read only memory , motherboard: the main hardware , ram: random access memory , circuit: computer circuitry , graphic: …
Automation and Robotics
constraint: a limitation or a restriction. it might include limits on time, materials, or size., engineer: a person who asks questions, observes, and gathers …
Computer Components
keyboard : input device used to type, touchpad: input device on a laptop, speakers: output device used to listen to music, joystick: input device used by …
Introduction to MS Office
folder : a named location, excel : spreadsheet app that deals with data, slide : the basic unit of a powerpoint presentation, spreadsheet : also known as a …
Data Structures
array: mutable and static. allocates contiguous memory for storing data., list: mutable and dynamic. can either be contiguous or will use a reference table., …
Object Oriented Programming
inheritance : which feature of oop indicates code reusability?, message passing : the feature by which one object can interact with another object is …
AI and Machine Learning
atificial : ____ intelligence, alexa: amazon's home assistant that recognises voice commands., rules: ai uses ____ to decide how to respond to the data …
Technology
broadband : a form of high-speed internet access., satnav : short form of 'satellite navigation', keypad : like a keyboard, but on a mobile device., …
Digital Electronics
associative : (a+b)+c= a+(b+c) is expression for ____ law., halfadder : a combinational circuit performs addition of two numbers, nor : if any one of input is 1 …
Computer Coding Terms
simulation : pretending to be a stand-in for the real thing, programming : writing instructions for a digital tool, program : a set of instructions that can be …
Cybersecurity
cryptominer: an activity where computers attempt to generate new cryptocurrencies., trojan: files, other than executables, that run malicious processes., …
Java Programming
two dimensional : also known as tables or matrices, graph : non-linear data structure consisting of nodes and edges, inheritance : objects can acquire the …
Internet Safety
symbols: a password should include numbers, uppercase letters, lowercase letters and ?, secure: what the 's' stands for in https, digitalfootprint: a …