Computers & IT Crossword Puzzles
Robotics and Artificial Intelligence
robot : a machine capable of carrying out a complex series of actions, multipurpose : a robot should be ____________ and re-programmable., data : neural …
Social Media
tiktok : users create music and lipsync videos they can share with their followers, facebook : currently the largest social media site in the world, instagram : …
Data Protection
legislation : another word for law, protection : the data ________ act? , confidential : personal details are classed as what type of information?, breach : …
Computer Coding Terms
simulation : pretending to be a stand-in for the real thing, programming : writing instructions for a digital tool, program : a set of instructions that can be …
Cybersecurity
cryptominer: an activity where computers attempt to generate new cryptocurrencies., trojan: files, other than executables, that run malicious processes., …
Internet Safety
symbols: a password should include numbers, uppercase letters, lowercase letters and ?, secure: what the 's' stands for in https, digitalfootprint: a trail of …
Communications and Networks
wifi: simply an internet connection that’s shared with multiple devices in a home or business via a wireless router., lan: using routers, it can connect to …
Technology
broadband : a form of high-speed internet access., satnav : short form of 'satellite navigation', keypad : like a keyboard, but on a mobile device., plug : you …
Computer Hardware
mouse: hand-held pointing device that detects two-dimensional motion relative to a surface, keyboard: peripheral input device modeled after the …
Computer
cpu: central processing unit , rom: read only memory , motherboard: the main hardware , ram: random access memory , circuit: computer circuitry , graphic: …
Information Security Awareness
vulnerability : a weakness, spam : unwanted communication, cryptography : the science of coding data to prevent unauthorized access, cia : the information …
Network Hardware and Type of Network
switch : device which handles messages more intelligently by knowing the address of the different devices on the network and only sends the message to the …
Phishing
articles : where to find additional information on the different types of (phishing), call for help : sense danger?, logos : familiar ___ are often faked by …
Microsoft Word
accessibility : the ability to retrieve files from anywhere at anytime, cloud computing : computing with tools and programs accessed exclusively via the …
Object Oriented Programming
inheritance : which feature of oop indicates code reusability?, message passing : the feature by which one object can interact with another object is …
Input Devices
microphone : input device used to record audio, keyboard : input device used to type, touchpad : input device on a laptop, touchscreen : used in mcdonalds to …
Cyber Security Month
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , links: don’t click on these …
Java Programming
two dimensional : also known as tables or matrices, graph : non-linear data structure consisting of nodes and edges, inheritance : objects can acquire the …
Digital Electronics
associative : (a+b)+c= a+(b+c) is expression for ____ law., halfadder : a combinational circuit performs addition of two numbers, nor : if any one of input is 1 …
Microsoft Excel
column: appears vertically in a spreadsheet, default: setting that a computer program assumes you will use, paste: placing copied data, operand: items on either …
Automation and Robotics
constraint: a limitation or a restriction. it might include limits on time, materials, or size., engineer: a person who asks questions, observes, and gathers …