Computers & IT Crossword Puzzles
Computer Fundamentals Review
external hardware : commonly referred to as peripherals, microchip : has electronic circuits on it and can hold large amounts of information, cloud storage : …
Basic Structures of Computers
system calls :to access the service of operating system,interface is provided by, interrupt :request signal from an i/o device for service by the processor, …
Cyber Security Month
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , links: don’t click on these …
Microsoft
pioneer: a person who develops or be the first to use or apply, microsoft : this company's mission statement is to empower every person and every …
Phishing
articles : where to find additional information on the different types of (phishing), call for help : sense danger?, logos : familiar ___ are often faked by …
HTML Terminology and Tags
hypertext : the h in html., title: html tag used to change the text in the tab at the top of a browser., browser: software used to view webpages., notepad: text …
Computer
cpu: central processing unit , rom: read only memory , motherboard: the main hardware , ram: random access memory , circuit: computer circuitry , graphic: …
Java Programming
two dimensional : also known as tables or matrices, graph : non-linear data structure consisting of nodes and edges, inheritance : objects can acquire the …
DATABASE MANAGEMENT SYSTEM
singletier : client server db resides on same location, heterogenous db : different sites can have different schema, erdiagram : blueprint of db, raid 3 : bit …
Digital Literacy
new tab : open another page in the browser, font : another name for text, double click : open a folder or file, email : electronic mail, word : document …
Cyber Forensics Quiz
arp: is how network devices associate mac addresses with ip addresses, stealware: is software that modifies affiliate tracking codes by replacing their …
Cybersecurity Awareness Week
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , vulnerability: a flaw or …
Data Structures: Review In Java Programming
repetition: also known as looping structures, binary: tree whose elements have at most two children, arrays: ordered collection of data items with the same …
Internet eSafety
esafety : the government website where you can report illegal online activity., cyber bullying : the use of electronic communication to bully a person, …
Computer Terms
ram : random access memory, type of computer memory that stores data temporarily while a computer is running, output : a place where power or information leaves …















