Computers & IT Crossword Puzzles
Cybersecurity
cryptominer: an activity where computers attempt to generate new cryptocurrencies., trojan: files, other than executables, that run malicious processes., …
Technology
broadband : a form of high-speed internet access., satnav : short form of 'satellite navigation', keypad : like a keyboard, but on a mobile device., …
Computer Viruses
backup: a copy of your important files and data for recovery in case of a virus attack or data loss, virus: a type of harmful software that can infect your …
The Internet
website : a connected group of pages on the world wide web, misinformation : false information that is spread, regardless of whether there is intent to mislead, …
Just EXCEL
macro : excel automation, addrow : shift + spacebar, addcolumn : ctrl + spacebar, edit : f2 enters this mode, printpreview : ctrl + f2 shows this, selectall : …
Internet Safety
symbols: a password should include numbers, uppercase letters, lowercase letters and ?, secure: what the 's' stands for in https, digitalfootprint: a …
Social Media
tiktok : users create music and lipsync videos they can share with their followers, facebook : currently the largest social media site in the world, instagram : …
Microsoft Excel
column: appears vertically in a spreadsheet, default: setting that a computer program assumes you will use, paste: placing copied data, operand: items on either …
Forensic Fingerprint
ridges: narrow, raised patterns on a person's fingertip, unique: being the only one of its type, fingerprints: a mark made by the tip of a human's …
Microsoft Word
accessibility : the ability to retrieve files from anywhere at anytime, cloud computing : computing with tools and programs accessed exclusively via the …
Cyber Safety
password : a secret word you use to keep your account safe., share : what you shouldn’t do with personal information online., kind : the way you should act …
Digital Innovations
googol : 10 to the 100 power, hyperlink : connecting between files or object, autobiography : talking about oneself, paste : ctrl-v, underline : ctrl-u, …
Memory & Storage
ram : memory in which the locations can be accessed directly in any order, rom :memory that can be read from, but not written to., secondary : types of …
Network Topic
star-topology : each device with its own cable connecting to the hub/switch, router : responsible for moving data from one network to another, topology : this …
Cyberbullying
spam : unsolicited electronic mail sent from someone you do not know., blog : interactive web journal or diary, the contents of which are viewable to everyone …















