Computers & IT Crossword Puzzles
Internet Safety
symbols: a password should include numbers, uppercase letters, lowercase letters and ?, secure: what the 's' stands for in https, digitalfootprint: a trail of …
Information Technology
ram: i am also called the main memory, graphicstablet: drawing high-quality images with a lot of details, cpu: i am the brain of the computer, omr: …
Social Media
tiktok : users create music and lipsync videos they can share with their followers, facebook : currently the largest social media site in the world, instagram : …
Technology
broadband : a form of high-speed internet access., satnav : short form of 'satellite navigation', keypad : like a keyboard, but on a mobile device., plug : you …
Forensic Fingerprint
ridges: narrow, raised patterns on a person's fingertip, unique: being the only one of its type, fingerprints: a mark made by the tip of a human's finger on an …
Computer Components
keyboard : input device used to type, touchpad: input device on a laptop, speakers: output device used to listen to music, joystick: input device used by …
Cybersecurity
cryptominer: an activity where computers attempt to generate new cryptocurrencies., trojan: files, other than executables, that run malicious processes., …
Network Hardware and Type of Network
switch : device which handles messages more intelligently by knowing the address of the different devices on the network and only sends the message to the …
Microsoft Excel
column: appears vertically in a spreadsheet, default: setting that a computer program assumes you will use, paste: placing copied data, operand: items on either …
Data Transmission
hdmi : a cable used to connect computers to displays., skew : an error caused because not all data bits arrive simultaneously., duplex : can send data in both …
AI and Machine Learning
atificial : ____ intelligence, alexa: amazon's home assistant that recognises voice commands., rules: ai uses ____ to decide how to respond to the data they …
Data Protection
legislation : another word for law, protection : the data ________ act? , confidential : personal details are classed as what type of information?, breach : …
Cyberbullying
spam : unsolicited electronic mail sent from someone you do not know., blog : interactive web journal or diary, the contents of which are viewable to everyone …
Computer Hardware
mouse: hand-held pointing device that detects two-dimensional motion relative to a surface, keyboard: peripheral input device modeled after the …
HTML Terminology and Tags
hypertext : the h in html., title: html tag used to change the text in the tab at the top of a browser., browser: software used to view webpages., notepad: text …