Computers & IT Crossword Puzzles
Cybersecurity
cryptominer: an activity where computers attempt to generate new cryptocurrencies., trojan: files, other than executables, that run malicious processes., …
Social Media
tiktok : users create music and lipsync videos they can share with their followers, facebook : currently the largest social media site in the world, instagram : …
Computer Components
keyboard : input device used to type, touchpad: input device on a laptop, speakers: output device used to listen to music, joystick: input device used by …
Computer
cpu: central processing unit , rom: read only memory , motherboard: the main hardware , ram: random access memory , circuit: computer circuitry , graphic: …
The Internet
website : a connected group of pages on the world wide web, misinformation : false information that is spread, regardless of whether there is intent to mislead, …
Internet Safety
symbols: a password should include numbers, uppercase letters, lowercase letters and ?, secure: what the 's' stands for in https, digitalfootprint: a …
Digital Electronics
associative : (a+b)+c= a+(b+c) is expression for ____ law., halfadder : a combinational circuit performs addition of two numbers, nor : if any one of input is 1 …
HTML Terminology and Tags
hypertext : the h in html., title: html tag used to change the text in the tab at the top of a browser., browser: software used to view webpages., notepad: text …
Computer Parts and Peripherals
touchscreen: interact with screen., video card: graphics card., processor: receives input and provides the output., ram: stored information., data: facts and …
Programming and Computational Thinking
algorithm : a sequence of logical instructions for carrying out a task. in computing, algorithms are needed to design computer programs., syntax : the set of …
Forensic Fingerprint
ridges: narrow, raised patterns on a person's fingertip, unique: being the only one of its type, fingerprints: a mark made by the tip of a human's …
Automation and Robotics
constraint: a limitation or a restriction. it might include limits on time, materials, or size., engineer: a person who asks questions, observes, and gathers …
Computer Architecture and Assembly Language
stack: used to hold data so program can later resume, pop: retrieiving an element from the stack, bitwise: comparing each bit with each respective bit, opcode: …
Data Protection
legislation : another word for law, protection : the data ________ act? , confidential : personal details are classed as what type of information?, breach : …
Networks
client : a computer that connects to a network, internet : a famous example of a wide area network, mesh : a network where every computer is interconnected, mac …















