Computers & IT Crossword Puzzles
Internet Safety
symbols: a password should include numbers, uppercase letters, lowercase letters and ?, secure: what the 's' stands for in https, digitalfootprint: a …
Phishing
articles : where to find additional information on the different types of (phishing), call for help : sense danger?, logos : familiar ___ are often faked by …
Cybersecurity
cryptominer: an activity where computers attempt to generate new cryptocurrencies., trojan: files, other than executables, that run malicious processes., …
HTML Terminology and Tags
hypertext : the h in html., title: html tag used to change the text in the tab at the top of a browser., browser: software used to view webpages., notepad: text …
Computer
cpu: central processing unit , rom: read only memory , motherboard: the main hardware , ram: random access memory , circuit: computer circuitry , graphic: …
AI and Machine Learning
atificial : ____ intelligence, alexa: amazon's home assistant that recognises voice commands., rules: ai uses ____ to decide how to respond to the data …
Java Programming
two dimensional : also known as tables or matrices, graph : non-linear data structure consisting of nodes and edges, inheritance : objects can acquire the …
DATABASE MANAGEMENT SYSTEM
singletier : client server db resides on same location, heterogenous db : different sites can have different schema, erdiagram : blueprint of db, raid 3 : bit …
Digital Literacy
new tab : open another page in the browser, font : another name for text, double click : open a folder or file, email : electronic mail, word : document …
Cyber Forensics Quiz
arp: is how network devices associate mac addresses with ip addresses, stealware: is software that modifies affiliate tracking codes by replacing their …
Cybersecurity Awareness Week
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , vulnerability: a flaw or …
Data Structures: Review In Java Programming
repetition: also known as looping structures, binary: tree whose elements have at most two children, arrays: ordered collection of data items with the same …
Data Structures
array: mutable and static. allocates contiguous memory for storing data., list: mutable and dynamic. can either be contiguous or will use a reference table., …
Internet eSafety
esafety : the government website where you can report illegal online activity., cyber bullying : the use of electronic communication to bully a person, …
Computer Terms
ram : random access memory, type of computer memory that stores data temporarily while a computer is running, output : a place where power or information leaves …















