Computers & IT Crossword Puzzles
Digital Innovations
googol : 10 to the 100 power, hyperlink : connecting between files or object, autobiography : talking about oneself, paste : ctrl-v, underline : ctrl-u, …
Memory & Storage
ram : memory in which the locations can be accessed directly in any order, rom :memory that can be read from, but not written to., secondary : types of …
Network Topic
star-topology : each device with its own cable connecting to the hub/switch, router : responsible for moving data from one network to another, topology : this …
Cyberbullying
spam : unsolicited electronic mail sent from someone you do not know., blog : interactive web journal or diary, the contents of which are viewable to everyone …
Input Devices
microphone : input device used to record audio, keyboard : input device used to type, touchpad : input device on a laptop, touchscreen : used in mcdonalds to …
Computer Hardware
mouse: hand-held pointing device that detects two-dimensional motion relative to a surface, keyboard: peripheral input device modeled after the …
Computer Fundamentals Review
external hardware : commonly referred to as peripherals, microchip : has electronic circuits on it and can hold large amounts of information, cloud storage : …
Basic Structures of Computers
system calls :to access the service of operating system,interface is provided by, interrupt :request signal from an i/o device for service by the processor, …
Cyber Security Month
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , links: don’t click on these …
Microsoft
pioneer: a person who develops or be the first to use or apply, microsoft : this company's mission statement is to empower every person and every …
Phishing
articles : where to find additional information on the different types of (phishing), call for help : sense danger?, logos : familiar ___ are often faked by …
Java Programming
two dimensional : also known as tables or matrices, graph : non-linear data structure consisting of nodes and edges, inheritance : objects can acquire the …
DATABASE MANAGEMENT SYSTEM
singletier : client server db resides on same location, heterogenous db : different sites can have different schema, erdiagram : blueprint of db, raid 3 : bit …
Cyber Forensics Quiz
arp: is how network devices associate mac addresses with ip addresses, stealware: is software that modifies affiliate tracking codes by replacing their …
Cybersecurity Awareness Week
password: should contain a minimum of 12 characters using uppercase letters, lowercase letters, numbers and special characters , vulnerability: a flaw or …















