Computers & IT Crossword Puzzles
Communications and Networks
wifi: simply an internet connection that’s shared with multiple devices in a home or business via a wireless router., lan: using routers, it can connect to …
Technology
broadband : a form of high-speed internet access., satnav : short form of 'satellite navigation', keypad : like a keyboard, but on a mobile device., plug : you …
Computer Hardware
mouse: hand-held pointing device that detects two-dimensional motion relative to a surface, keyboard: peripheral input device modeled after the …
Social Media
tiktok : users create music and lipsync videos they can share with their followers, facebook : currently the largest social media site in the world, instagram : …
Computer
cpu: central processing unit , rom: read only memory , motherboard: the main hardware , ram: random access memory , circuit: computer circuitry , graphic: …
Information Security Awareness
vulnerability : a weakness, spam : unwanted communication, cryptography : the science of coding data to prevent unauthorized access, cia : the information …
Network Hardware and Type of Network
switch : device which handles messages more intelligently by knowing the address of the different devices on the network and only sends the message to the …
Phishing
articles : where to find additional information on the different types of (phishing), call for help : sense danger?, logos : familiar ___ are often faked by …
Microsoft Word
accessibility : the ability to retrieve files from anywhere at anytime, cloud computing : computing with tools and programs accessed exclusively via the …
Object Oriented Programming
inheritance : which feature of oop indicates code reusability?, message passing : the feature by which one object can interact with another object is …
Input Devices
microphone : input device used to record audio, keyboard : input device used to type, touchpad : input device on a laptop, touchscreen : used in mcdonalds to …
Data Protection
legislation : another word for law, protection : the data ________ act? , confidential : personal details are classed as what type of information?, breach : …
Cyber Security Month
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , links: don’t click on these …
Java Programming
two dimensional : also known as tables or matrices, graph : non-linear data structure consisting of nodes and edges, inheritance : objects can acquire the …
Robotics and Artificial Intelligence
robot : a machine capable of carrying out a complex series of actions, multipurpose : a robot should be ____________ and re-programmable., data : neural …
Digital Electronics
associative : (a+b)+c= a+(b+c) is expression for ____ law., halfadder : a combinational circuit performs addition of two numbers, nor : if any one of input is 1 …
Microsoft Excel
column: appears vertically in a spreadsheet, default: setting that a computer program assumes you will use, paste: placing copied data, operand: items on either …
Automation and Robotics
constraint: a limitation or a restriction. it might include limits on time, materials, or size., engineer: a person who asks questions, observes, and gathers …
Forensic Fingerprint
ridges: narrow, raised patterns on a person's fingertip, unique: being the only one of its type, fingerprints: a mark made by the tip of a human's finger on an …
AI and Machine Learning
atificial : ____ intelligence, alexa: amazon's home assistant that recognises voice commands., rules: ai uses ____ to decide how to respond to the data they …
Computer Application Technology
application : a program for a specific task (e.g., game, calculator)., browser : software for viewing websites (e.g., chrome, safari)., click : to select …